{"id":89,"date":"2023-08-23T00:00:00","date_gmt":"2023-08-23T00:00:00","guid":{"rendered":"https:\/\/conscia.com\/uk\/?p=89"},"modified":"2025-07-14T09:46:14","modified_gmt":"2025-07-14T09:46:14","slug":"fostering-security-buy-in-within-your-organisation","status":"publish","type":"post","link":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/","title":{"rendered":"Fostering security buy-in within your organisation"},"content":{"rendered":"\n\n\n<p class=\" wp-block-paragraph\">It\u2019s an unpleasant fact of modern life that rarely a week will go by without news of a high-profile data breach, leak, or targeted attack. Even multi-million-pound organisations, with IT teams larger than some businesses, frequently find themselves the victims of inadvertent leaks or phishing attacks, underlining the fact that \u2013 although many may wish it so \u2013 effective cyber security is not just a matter of throwing money at the problem.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">In a world where&nbsp;<a href=\"https:\/\/www.verizon.com\/business\/en-gb\/resources\/reports\/dbir\/\">around three-quarters of data breaches continue to involve the human element<\/a>, it is na\u00efve to believe that a robust defence can be achieved without first ensuring that understanding, compliance, and support is present at all levels of the organisation \u2013 whether it\u2019s an NHS trust, university, or private business. This naturally includes the basic training and awareness that most organisations will already be conducting, but it also goes much further \u2013 for the greatest success, the organisation needs to foster legitimate buy-in from all those involved.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Though they may not be involved in the nuts and bolts of a cyber defence solution, this still includes the organisation\u2019s leadership team. Without ensuring that they are fully behind the effort, even exhaustively planned implementations can end up under-funded, deprioritised, or completed half-heartedly \u2013 leading to an unsuccessful implementation and ultimately achieving little other than spending organisational time and resources. Similarly, in-house IT teams will need to be fully invested in any cyber security effort, as they\u2019ll be the ones primarily responsible for implementing and maintaining the measures put in place \u2013 as well as being on the front lines should an attack or breach occur. Without their commitment, potentially sound implementations risk languishing without ongoing reviews and maintenance, leaving the organisation vulnerable to new and emerging threats. Finally, the rest of the staff in the organisation will need to be kept abreast of developments and engaged in training, as they\u2019ll likely be interacting with the system on a daily basis. Without suitable training, every member of staff in the organisation can represent a potential security vulnerability, whether it\u2019s through manipulation by social engineering, stolen credentials, privilege misuse, or simple error.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">It might be taken for granted that the leadership team would rally behind a robust cyber security implementation, given the threat of attacks or breaches down the line. After all, such an incident could mean devastating financial and reputational loss for the company, even putting aside the disruption to productivity and operation that would occur immediately afterwards. However, it\u2019s likely that many within the leadership team will have gone through enough business continuity policies and crisis contingency plans that they may feel somewhat inured to the prospect; if it hasn\u2019t happened yet, they may think, who\u2019s to say it ever will? Or, perhaps more alarmingly, if it\u2019s going to happen eventually, why bother trying to avoid it at all?<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">The leadership team will be the most likely group to value the health and reputation of the business, and so hopefully they will already be fully aware and on board with implementing effective cyber security measures. If they still need some persuading, however, there are a few avenues that can be explored. Conducting some basic security testing within the organisation \u2013 for example, sending out false phishing emails internally \u2013 can be an effective method of gathering hard evidence of the resilience of the organisation\u2019s current security measures, which can then be taken to the leadership. While it\u2019s easy to put theoretical threats out of mind, being presented with evidence that, had a real attack occurred, the company could have been compromised is more likely to catch their attention. If the proposed implementation would involve partnering with a specialist, the case can also be made that they may identify and eliminate inefficiencies and redundancies in the current system, improving organisational productivity generally.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">An organisation\u2019s internal IT team is another group that might be assumed to have pre-existing buy-in regarding refactoring and strengthening cyber defences. However, in many cases these internal teams are stretched to such an extent that just keeping the existing estate running is taking up the vast majority of their time. It can be a very tall order to then expect them to carve out the time to implement new measures without having it impact the rest of their responsibilities.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">There are two approaches that might help dampen these concerns. Firstly, it\u2019s worth emphasising that pre-emptively putting in place a solid security foundation will undoubtedly take much less time and effort \u2013 and result in less stress \u2013 than attempting to remedy a situation after a substantial breach or successful attack. Secondly, contracting with a specialist third-party partner to take ownership of the task can not only help achieve outcomes beyond what might be possible using internal resources, but these partners can also provide optimisation and management services that will lighten the day-to-day workload placed upon in-house IT teams. This might take the form of locating bottlenecks in outdated or underperforming hardware, or ensuring interoperability between systems that previously didn\u2019t communicate correctly, and reducing the number of tickets raised by the wider staff.<\/p>\n\n\n\n<p class=\" wp-block-paragraph\">Speaking of the wider staff, one of the most effective ways to ensure that everyone is working towards the same goal is to build a culture within the organisation where cyber security is a frequent topic of focus. If the subject is one that people only encounter once a year when they\u2019re tasked with training exercises, it\u2019s more likely that they will view it as something that only needs to be thought about during those periods. This doesn\u2019t need to take the form of endless corporate training \u2013 framing information in terms that will help individuals in their personal lives can help them to ingest the important details, and learn skills that will be equally applicable at home or work. Quizzes and informal tests can also help, but it\u2019s important that individuals don\u2019t feel that they\u2019ll be penalised for getting something wrong, either in the test or in a real-life scenario. The last thing an organisation wants is for an individual to feel afraid to bring attention to a potential mistake and instead hope it just goes away. Most of all, remember that you don\u2019t need to do all of this on your own. An experienced partner will help you to clearly elucidate the goals and importance of strengthening your defences, as well as providing the experience and skills required to bring these goals to fruition, without straining your internal teams even further than they currently are. Get in touch with us at&nbsp;<a href=\"mailto:security@itgl.com\">security@itgl.com<\/a>&nbsp;to start a discussion around your organisation\u2019s needs, goals, and how we can help you achieve these.<\/p>\n\n\n\n<div id=\"block_acf-block-6866880517639\" class=\"profile \">\n\t<img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"300\" src=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg\" class=\"profile__thumbnail wp-post-image\" alt=\"\" srcset=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-300x300.jpeg 300w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy-150x150.jpeg 150w, https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/07\/andy.jpeg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>\t<div class=\"profile__info\">\n\t\t<a href=\"https:\/\/conscia.com\/uk\/profile\/andy-le-grice\/\" class=\"profile__meta\">\n\t\t\t<p class=\"profile__name\">Andy Le Grice<\/p>\n\t\t\t\t\t\t\t<p class=\"profile__title\">Security Practice Lead<\/p>\n\t\t\t\t\t<\/a>\n\t\t\t<\/div>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Cybersecurity isn\u2019t just a technical issue\u2014it\u2019s a cultural one. With human error driving the majority of data breaches, effective protection starts with organisation-wide buy-in, from leadership to IT to everyday staff. Simply investing in tools isn\u2019t enough; leadership must champion cybersecurity, IT teams need bandwidth and support, and employees must be engaged and trained. Cultivating a culture where security is understood, prioritised, and openly discussed is key. At ITGL, we help organisations embed robust cyber practices at every level, strengthening defences and easing the burden on internal teams. Start the conversation at\u202fsecurity@itgl.com.<\/p>\n","protected":false},"author":2,"featured_media":90,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[1],"global_solutions":[6],"global_partners":[],"global_industries":[],"global_business_outcome":[],"global_types":[],"class_list":["post-89","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized","global_solutions-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.4 (Yoast SEO v26.4) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Fostering security buy-in within your organisation - Conscia UK<\/title>\n<meta name=\"description\" content=\"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Fostering security buy-in within your organisation\" \/>\n<meta property=\"og:description\" content=\"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\" \/>\n<meta property=\"og:site_name\" content=\"Conscia UK\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-23T00:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-14T09:46:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"909\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mikkel Elvej\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mikkel Elvej\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\"},\"author\":{\"name\":\"Mikkel Elvej\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\"},\"headline\":\"Fostering security buy-in within your organisation\",\"datePublished\":\"2023-08-23T00:00:00+00:00\",\"dateModified\":\"2025-07-14T09:46:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\"},\"wordCount\":1133,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg\",\"articleSection\":[\"Uncategorized\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\",\"url\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\",\"name\":\"Fostering security buy-in within your organisation - Conscia UK\",\"isPartOf\":{\"@id\":\"https:\/\/conscia.com\/uk\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg\",\"datePublished\":\"2023-08-23T00:00:00+00:00\",\"dateModified\":\"2025-07-14T09:46:14+00:00\",\"description\":\"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg\",\"width\":1600,\"height\":909,\"caption\":\"Mature manager leading a discussion with his team in a boardroom. Group of businesspeople having a meeting in a modern workplace. Diverse businesspeople working together on a new project.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conscia.com\/uk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Fostering security buy-in within your organisation\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conscia.com\/uk\/#website\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"name\":\"Conscia UK\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/conscia.com\/uk\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conscia.com\/uk\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/conscia.com\/uk\/#organization\",\"name\":\"Conscia UK\",\"url\":\"https:\/\/conscia.com\/uk\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"contentUrl\":\"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png\",\"width\":628,\"height\":628,\"caption\":\"Conscia UK\"},\"image\":{\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/itglconscia-uk\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3\",\"name\":\"Mikkel Elvej\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g\",\"caption\":\"Mikkel Elvej\"},\"url\":\"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Fostering security buy-in within your organisation - Conscia UK","description":"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/","og_locale":"en_GB","og_type":"article","og_title":"Fostering security buy-in within your organisation","og_description":"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.","og_url":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/","og_site_name":"Conscia UK","article_published_time":"2023-08-23T00:00:00+00:00","article_modified_time":"2025-07-14T09:46:14+00:00","og_image":[{"width":1600,"height":909,"url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg","type":"image\/jpeg"}],"author":"Mikkel Elvej","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mikkel Elvej","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#article","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/"},"author":{"name":"Mikkel Elvej","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3"},"headline":"Fostering security buy-in within your organisation","datePublished":"2023-08-23T00:00:00+00:00","dateModified":"2025-07-14T09:46:14+00:00","mainEntityOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/"},"wordCount":1133,"commentCount":0,"publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg","articleSection":["Uncategorized"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/","url":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/","name":"Fostering security buy-in within your organisation - Conscia UK","isPartOf":{"@id":"https:\/\/conscia.com\/uk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage"},"image":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage"},"thumbnailUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg","datePublished":"2023-08-23T00:00:00+00:00","dateModified":"2025-07-14T09:46:14+00:00","description":"Cyber security success depends on more than just technology\u2014learn how leadership buy-in, staff engagement, and culture can protect your organisation from threats.","breadcrumb":{"@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#primaryimage","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2025\/06\/Fostering-security-buy-in-within-your-organisation-image.jpg","width":1600,"height":909,"caption":"Mature manager leading a discussion with his team in a boardroom. Group of businesspeople having a meeting in a modern workplace. Diverse businesspeople working together on a new project."},{"@type":"BreadcrumbList","@id":"https:\/\/conscia.com\/uk\/blog\/fostering-security-buy-in-within-your-organisation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conscia.com\/uk\/"},{"@type":"ListItem","position":2,"name":"Fostering security buy-in within your organisation"}]},{"@type":"WebSite","@id":"https:\/\/conscia.com\/uk\/#website","url":"https:\/\/conscia.com\/uk\/","name":"Conscia UK","description":"","publisher":{"@id":"https:\/\/conscia.com\/uk\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conscia.com\/uk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/conscia.com\/uk\/#organization","name":"Conscia UK","url":"https:\/\/conscia.com\/uk\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/","url":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","contentUrl":"https:\/\/conscia.com\/uk\/wp-content\/uploads\/2026\/03\/symbol-white-on-burgundy-large-1.png","width":628,"height":628,"caption":"Conscia UK"},"image":{"@id":"https:\/\/conscia.com\/uk\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/itglconscia-uk\/"]},{"@type":"Person","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/f0d199c1d0ac57c1c6a3075e4cf73cd3","name":"Mikkel Elvej","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/conscia.com\/uk\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/872c0da1fa238af642c0fd874f91c36aaa29e0d61ae46190532092637c9eeee4?s=96&d=mm&r=g","caption":"Mikkel Elvej"},"url":"https:\/\/conscia.com\/uk\/blog\/author\/mhe\/"}]}},"_links":{"self":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/89","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/comments?post=89"}],"version-history":[{"count":3,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/89\/revisions"}],"predecessor-version":[{"id":836,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/posts\/89\/revisions\/836"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media\/90"}],"wp:attachment":[{"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/media?parent=89"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/categories?post=89"},{"taxonomy":"global_solutions","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_solutions?post=89"},{"taxonomy":"global_partners","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_partners?post=89"},{"taxonomy":"global_industries","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_industries?post=89"},{"taxonomy":"global_business_outcome","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_business_outcome?post=89"},{"taxonomy":"global_types","embeddable":true,"href":"https:\/\/conscia.com\/uk\/wp-json\/wp\/v2\/global_types?post=89"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}