{"id":83,"date":"2023-05-23T00:00:00","date_gmt":"2023-05-23T00:00:00","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=83"},"modified":"2025-07-14T09:47:45","modified_gmt":"2025-07-14T09:47:45","slug":"quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/","title":{"rendered":"Quantum computing may be decades away, but its effects are already being felt"},"content":{"rendered":"\n\n\n<p class=\" wp-block-paragraph\">In his recent spring budget statement, Chancellor Jeremy Hunt announced a \u00a32.5 billion \u2018national quantum computing programme\u2019,\u00b9 as part of a new National Quantum Strategy, with the vision for \u201cthe UK to be a leading quantum-enabled economy by 2033\u201d.\u00b2 While quantum computing may not be grabbing as many headlines as AI, this level of investment is a clear sign that the UK government views it as an equally important prospect for the future.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Similar to AI, the ultimate form of this quantum prospect remains relatively uncertain, and its potential applications are broad and sometimes difficult to predict. Tech giants across the world are already hard at work on quantum networking and communications, while there are great hopes for the fields of pharmaceutical research and development, and even climate change. One of the most commonly posited effects, however, is less positive: the breaking of traditional encryption methods.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The theory, put simply, is that while current encryption methods have been designed to be prohibitively difficult for traditional computers to break, the capabilities of a sufficiently powerful quantum computer will render this task trivial. If and when this occurs \u2013 and most seem to agree that this&nbsp;<em>will&nbsp;<\/em>happen at some point \u2013 the entire world will be faced with one of the main components of secure data transmission and storage being rendered useless.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Exactly how long this will take is unknown. Predictions range from the optimistic (or pessimistic, depending on your viewpoint) eight years, to more than two decades from now.\u00b3 There are already concerted efforts to put together so-called \u2018quantum-safe\u2019 encryption methods ahead of time, but there is a threat posed by this future event that already exists, and could impact organisations now, in the present day.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">This threat is the concept of \u2018steal now, decrypt later\u2019 \u2013 that is, if a hostile actor knows that in the near future traditional encryption may be broken, then they could steal data now while it still uses that traditional encryption, and simply sit on it until quantum computing catches up.\u2074 Naturally, this kind of attack is of limited use for data that won\u2019t retain its value over the course of a decade or longer, but for data with a longer shelf life it poses a real concern.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Of course, the ideal solution to this issue would be to secure everything with a quantum-safe encryption method as soon as possible. However, such encryption remains a moving target; last summer, the USA\u2019s National Institute of Standards and Technology announced four candidates for cryptographic algorithms deemed \u201cquantum resistant\u201d\u2075, only for one of the four to be broken a month later using a \u2018classical\u2019 (i.e., not quantum) laptop.\u2076 In any case, even these proposed methods are still undergoing stringent testing and appraisal, and are not yet ready for widescale applications.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">A more straightforward solution does exist: keep doing everything you can to stop bad actors from being in a position to steal encrypted data in the first place. Even before the looming threat of quantum, encryption should never have been considered the be-all and end-all of data security. Following security best practices within your organisation can drastically reduce the chances of attackers having access to files \u2013 encrypted or not \u2013 for them to extract. We\u2019ve spoken before about&nbsp;<a href=\"https:\/\/www.itgl.com\/blogs\/improving-staff-password-habits-a-resolution-worth-sticking-with\">maintaining healthy password habits<\/a>&nbsp;and fostering a&nbsp;<a href=\"https:\/\/www.itgl.com\/blogs\/news-corp-outfoxed-by-it-intruders-for-years-the-register\">zero-trust environment<\/a>&nbsp;in your organisation, both of which will have a substantial impact on your overall cybersecurity. Looking more broadly, an excellent first step on that journey is to work towards Cyber Essentials certification, and the more comprehensive Cyber Essentials Plus. These are government-backed schemes aimed at preparing organisations for cyberattacks and improving their security posture. These schemes will task you with taking a critical eye to your organisation\u2019s current security and IT practices, and provide rock-solid guidelines based around five key technical themes: firewalls, secure configuration, user access control, malware protection, and security update management. ITGL has extensive experience working with organisations in the public and private sectors to help them achieve these certifications. If you\u2019re uncertain on the best place to start, we\u2019d love to talk through your current situation, and the areas in which you can most effectively make improvements \u2013 just get in touch at&nbsp;<a href=\"mailto:security@itgl.com\">security@itgl.com<\/a>.<\/p>\n\n\n\n<div id=\"block_acf-block-6866950bdedfa\" class=\"profile \">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg\" class=\"profile__thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg 300w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-150x150.jpeg 150w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy.jpeg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t<div class=\"profile__info\">\n\t\t<a href=\"https:\/\/conscia.com\/uk\/profile\/andy-le-grice\/\" class=\"profile__meta\">\n\t\t\t<p class=\"profile__name\">Andy Le Grice<\/p>\n\t\t\t\t\t\t\t<p class=\"profile__title\">Security Practice Lead<\/p>\n\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Chancellor Jeremy Hunt\u2019s \u00a32.5 billion National Quantum Computing Programme highlights the UK\u2019s ambition to lead in quantum technology by 2033. Quantum computing offers exciting possibilities but also threatens current encryption methods, potentially exposing sensitive data. This creates a real risk known as \u201csteal now, decrypt later,\u201d where attackers capture encrypted data now to decrypt it once quantum power advances. While quantum-safe encryption is still being developed, organisations must focus on strong cybersecurity fundamentals to protect their data today. If you\u2019re unsure where to start, contact us at security@itgl.com for expert advice.<\/p>\n","protected":false},"author":2,"featured_media":84,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[6],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-83","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum computing may be decades away, but its effects are already being felt - Conscia UK<\/title>\n<meta name=\"description\" content=\"As quantum computing advances, traditional encryption faces obsolescence. Learn how &#039;steal now, decrypt later&#039; threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum computing may be decades away, but its effects are already being felt\" \/>\n<meta property=\"og:description\" content=\"As quantum computing advances, traditional encryption faces obsolescence. Learn how &#039;steal now, decrypt later&#039; threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-23T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T09:47:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1067\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\"},\"headline\":\"Quantum computing may be decades away, but its effects are already being felt\",\"datePublished\":\"2023-05-23T00:00:00+00:00\",\"dateModified\":\"2025-07-14T09:47:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\"},\"wordCount\":720,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\",\"name\":\"Quantum computing may be decades away, but its effects are already being felt - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg\",\"datePublished\":\"2023-05-23T00:00:00+00:00\",\"dateModified\":\"2025-07-14T09:47:45+00:00\",\"description\":\"As quantum computing advances, traditional encryption faces obsolescence. Learn how 'steal now, decrypt later' threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg\",\"width\":1600,\"height\":1067,\"caption\":\"Woman IT specialist in elegant suit working on notebook computer in data center next to server racks\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum computing may be decades away, but its effects are already being felt\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Quantum computing may be decades away, but its effects are already being felt - Conscia UK","description":"As quantum computing advances, traditional encryption faces obsolescence. Learn how 'steal now, decrypt later' threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/","og_locale":"en_GB","og_type":"article","og_title":"Quantum computing may be decades away, but its effects are already being felt","og_description":"As quantum computing advances, traditional encryption faces obsolescence. Learn how 'steal now, decrypt later' threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.","og_url":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/","og_site_name":"Conscia UK","article_published_time":"2023-05-23T00:00:00+00:00","article_modified_time":"2025-07-14T09:47:45+00:00","og_image":[{"width":1600,"height":1067,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3"},"headline":"Quantum computing may be decades away, but its effects are already being felt","datePublished":"2023-05-23T00:00:00+00:00","dateModified":"2025-07-14T09:47:45+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/"},"wordCount":720,"commentCount":0,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/","url":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/","name":"Quantum computing may be decades away, but its effects are already being felt - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg","datePublished":"2023-05-23T00:00:00+00:00","dateModified":"2025-07-14T09:47:45+00:00","description":"As quantum computing advances, traditional encryption faces obsolescence. Learn how 'steal now, decrypt later' threats highlight the urgent need for proactive cybersecurity and quantum-safe strategies.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Quantum-computing-image.jpg","width":1600,"height":1067,"caption":"Woman IT specialist in elegant suit working on notebook computer in data center next to server racks"},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/quantum-computing-may-be-decades-away-but-its-effects-are-already-being-felt\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Quantum computing may be decades away, but its effects are already being felt"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/83","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=83"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/83\/revisions"}],"predecessor-version":[{"id":839,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/83\/revisions\/839"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/84"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=83"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=83"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=83"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=83"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=83"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=83"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=83"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}