{"id":122,"date":"2024-06-25T11:00:00","date_gmt":"2024-06-25T11:00:00","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=122"},"modified":"2025-09-30T08:55:32","modified_gmt":"2025-09-30T07:55:32","slug":"strengthening-defence-against-cyberattacks","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/","title":{"rendered":"Strengthening defence against cyber attacks"},"content":{"rendered":"\n\n\n<p class=\" wp-block-paragraph\">It\u2019s likely that if you compiled a list of the top issues facing higher education five years ago, or five years from now, the number one spot would be some variation on the same theme: cybersecurity. In many ways, it\u2019s the ur-issue for IT professionals, being so wide-ranging and interconnected that it tends to dominate conversations and fill whatever space you provide it. Of course, as anyone reading this will know, its ubiquity is well earned. Cybersecurity unavoidably informs and is informed by every decision and action taken not only within your digital infrastructure, but the cloud services you employ, the applications you run, and the staff tasked with maintaining it.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Matters aren\u2019t helped by universities becoming&nbsp;<a href=\"https:\/\/www.knowbe4.com\/hubfs\/Exponential-Growth-In-Cyber-Attacks-Against-Higher-Education-Institutions-WP_EN-us.pdf\">an increasingly common target of cyberattacks<\/a>, tasked with weathering ever-more complex, automated, AI-powered attacks from both financially-motivated individuals\/groups and \u2013&nbsp;<a href=\"https:\/\/www.bbc.co.uk\/news\/uk-68902636\">as recently briefed to the Russell Group by MI5<\/a>&nbsp;\u2013 state-sponsored actors. Universities hold a tremendous amount of data relative to their typical security posture, often including cutting-edge research alongside the sensitive personal data of staff and students. As the continuing skills gap makes it difficult for institutions to organically grow their teams\u2019 experience and expertise, institutions are frequently left with limited resources to safeguard this valuable data from attack by foreign states.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">So, how does a modern university look to strengthen their defences, provide information assurance,&nbsp;<em>and<\/em>&nbsp;tackle these challenges \u2013 alongside all of the individual financial and structural pressures they\u2019re inevitably facing? This will have been drummed into everyone\u2019s heads over the years, but its continued relevance speaks to its fundamental nature: by working to the principles of the CIA triad (confidentiality, integrity, and availability), organisations will naturally build towards an approach that is secure by design. Done correctly, this will form what the late, great Mick Jenkins \u2013 my CISO during my time at Brunel University, and&nbsp;<a href=\"https:\/\/www.ucisa.ac.uk\/Events\/2021\/February\/The-Shifting-Axis-of-Cyber-Crime\">previous UCISA contributor<\/a>&nbsp;\u2013 would call \u2018Information Safe Havens\u2019.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">To achieve this, however, it\u2019s critical that this approach is applied with a critical eye across the entirety of an organisation\u2019s systems \u2013 not just to new and future solutions. It\u2019ll come as no surprise to those\u00a0<a href=\"https:\/\/conscia.com\/uk\/blog\/investing-in-sustainable-infrastructure\/\">who read my previous blog<\/a>, but in practical terms, implementing the correct network architecture at a foundational level remains the single most effective action an institution can take to improve defences against cyberattack. Hearing that might start financial alarm bells ringing, but remember that cybersecurity\u2019s broad nature cuts both ways; improvements made here will also mean tangible benefits are felt throughout the organisation.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The alternatives \u2013 such as attempting to patch over vulnerabilities in existing architecture \u2013 may initially sound like less intrusive, less disruptive options, but in reality the issue is simply being kicked a little further down the road. Digital transformation is not, after all, solely the domain of the \u2018good guys\u2019 \u2013 threat actors are themselves just as energetically engaged in these processes as we are, and with significantly fewer restrictions placed on their methods. Cyberattacks have never before enjoyed such an established, commercialised existence as they do today. Cybercrime-as-a-service and ransomware-as-a-service have provided simple turnkey solutions to those without the technical knowhow to mount an attack themselves \u2013 adding market competition to the list of incentives to continually develop new tactics, techniques and procedures to defeat our defences.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">As this threat landscape evolves \u2013 and as standards and accreditations like ISO 27001 and Cyber Essentials evolve to reflect it \u2013 the remediations required to provide effective defence become more and more complex \u2013 and more costly \u2013 to reconcile with underlying hardware and networks that were not designed for such purposes.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">By making the decision to invest in advanced security measures, institutions will be taking the long view on what is ultimately a marathon, not a sprint \u2013 building resilience and positioning themselves as leaders in the cybersecurity space for their sector. A resilient network naturally helps to minimise potential financial losses \u2013 both from loss of operations due to disruption, and \u2013 with&nbsp;<a href=\"https:\/\/uk.newsroom.ibm.com\/24-07-2023-IBM-Security-Report-Cost-of-a-Data-Breach-for-UK-Businesses-Averages-3-4m\">the average cost of a data breach topping \u00a33.4m in 2023<\/a>&nbsp;\u2013 from cyberattack.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">These benefits in turn spread out to all who interact with the university. By implementing resilient network infrastructure, universities can look to ensure uninterrupted access to digital resources, thereby enhancing the overall reliability of campus technology, and the user experience of students and staff. Academic and administrative staff will be empowered by this availability to fulfil their roles effectively, removing frustrations and bottlenecks in their day-to-day duties. Building upon modern, scalable architecture opens up innovative teaching methodologies, enabling the integration of advanced technologies for flexible, uninterrupted, immersive learning experiences that can catch the imagination of prospective students in a crowded field, and help existing students in their studies.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">It\u2019s natural that every university wants to promote data privacy and security across their organisation, and a real culture of trust and transparency is only possible when an institution can provide peace of mind and confidence in the safety of personal and academic data. This can seem out of reach for institutions that are already feeling the squeeze of financial pressures and workforce shortages, but there are meaningful first steps that any institution can take towards achieving security and resilience.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">This can be as simple as working with an outside partner to consult on achieving Cyber Essentials, or providing skills on demand to integrate into your internal teams and safely deliver on projects that would otherwise be beyond your capacity. It can also be as involved as collaborating on a roadmap for your institution\u2019s digital journey, providing clarity on where you stand, mapping out well-defined steps towards your goals, and working alongside you to achieve them. The worst possible situation is one where you\u2019re not. Wherever your institution stands on its transformation journey, there is support and guidance available to help you effectively protect your staff, students, and infrastructure now and into the future.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\"><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article highlights cybersecurity as the top challenge for universities facing sophisticated attacks and limited resources. Simon Furber emphasises building resilient, secure-by-design networks based on the CIA triad\u2014confidentiality, integrity, and availability\u2014as foundational to protecting sensitive data and enabling seamless operations. Rather than quick fixes, investing in strong network architecture improves security and user experience, supporting innovative learning. Despite financial and skills challenges, institutions can take meaningful steps, such as partnering for certifications or skills support, to safeguard their communities now and in the future.<\/p>\n","protected":false},"author":2,"featured_media":123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[6],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-122","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Strengthening defence against cyber attacks - Conscia UK<\/title>\n<meta name=\"description\" content=\"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Strengthening defence against cyber attacks\" \/>\n<meta property=\"og:description\" content=\"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2024-06-25T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-30T07:55:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"900\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\"},\"headline\":\"Strengthening defence against cyber attacks\",\"datePublished\":\"2024-06-25T11:00:00+00:00\",\"dateModified\":\"2025-09-30T07:55:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\"},\"wordCount\":984,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\",\"name\":\"Strengthening defence against cyber attacks - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg\",\"datePublished\":\"2024-06-25T11:00:00+00:00\",\"dateModified\":\"2025-09-30T07:55:32+00:00\",\"description\":\"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg\",\"width\":1600,\"height\":900},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Strengthening defence against cyber attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Strengthening defence against cyber attacks - Conscia UK","description":"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/","og_locale":"en_GB","og_type":"article","og_title":"Strengthening defence against cyber attacks","og_description":"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.","og_url":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/","og_site_name":"Conscia UK","article_published_time":"2024-06-25T11:00:00+00:00","article_modified_time":"2025-09-30T07:55:32+00:00","og_image":[{"width":1600,"height":900,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3"},"headline":"Strengthening defence against cyber attacks","datePublished":"2024-06-25T11:00:00+00:00","dateModified":"2025-09-30T07:55:32+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/"},"wordCount":984,"commentCount":0,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/","url":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/","name":"Strengthening defence against cyber attacks - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg","datePublished":"2024-06-25T11:00:00+00:00","dateModified":"2025-09-30T07:55:32+00:00","description":"Explore how universities can build resilience against escalating cyber threats in this insightful blog by ITGL\u2019s Simon Furber, originally published by UCISA. From foundational network architecture to cultivating a culture of trust, learn practical steps for enhancing cybersecurity and navigating digital transformation in higher education.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Strengthening-defence-against-cyberattacks-image.jpg","width":1600,"height":900},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/strengthening-defence-against-cyberattacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Strengthening defence against cyber attacks"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/122","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":4,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/122\/revisions"}],"predecessor-version":[{"id":2755,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/122\/revisions\/2755"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/123"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=122"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=122"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=122"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=122"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=122"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}