{"id":23916,"date":"2025-05-19T15:12:42","date_gmt":"2025-05-19T13:12:42","guid":{"rendered":"https:\/\/www.advens.test\/?p=23916"},"modified":"2025-05-20T06:24:20","modified_gmt":"2025-05-20T04:24:20","slug":"biomedical-and-cybersecurity-specific-challenges","status":"publish","type":"post","link":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/media\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/","title":{"rendered":"Biomedical and cybersecurity: specific challenges?"},"content":{"rendered":"\n<p><strong>Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished in any case by particularly critical issues.<\/strong><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Health-specific operational systems<\/strong><\/h2>\n\n\n\n<p>Medical imaging, appointment scheduling, remote consultations, IT has become ubiquitous in healthcare facilities and in the patient care pathway. Biomedical informatics thus includes all health equipment connected to information systems: scanners, analysis devices, monitors, etc.  This field, historically managed by doctors and not by IT teams, represents a real risk for the cybersecurity of hospitals, but not only. In this industry even more than anywhere else, network <strong>availability <\/strong>and data <strong>integrity <\/strong>are critical: lives can depend on it.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>And specific issues<\/strong><\/h2>\n\n\n\n<p>In the hospital, it is therefore vital that the operational infrastructure works when it is needed. However, as soon as these various biomedical devices are <strong>connected to the network, <\/strong>they become just as vulnerable as conventional computers or servers. Unfortunately, the professionals concerned, both users and manufacturers, are still <strong>unaware of the cybersecurity issues specific to this biomedical informatics<\/strong>. However, the sector has a long experience in operational safety but it integrates less the logic of security, which requires to <strong>consider malicious acts.<\/strong> To these cultural aspects is added a <strong>fleet of equipment often obsolete<\/strong> and difficult to master. Its inventory can be complex because of the diversity of the devices that compose it, their geographical distribution and the low centralization of information about them.<\/p>\n\n\n\n<p>For L\u00e9onard Keat, Head of Operations South-East Advens, the difficulties also stem from a certain <strong>dependence on suppliers<\/strong> or software publishers:<\/p>\n\n\n\n<figure id=\"block-citation-1380363108\" class=\"acf-block-citation  mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">&#8220;Few internal teams have access to equipment, either because the supplier has not integrated the notion of role, or because the latter is the only one authorized to access it.&#8221;<\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>L\u00e9onard Keat<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Head of Southeast Operations<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Auditing to better protect biomedical informatics<\/strong><\/h2>\n\n\n\n<p>While it is impossible to prevent cyberattacks 100%, solutions exist to better secure this fleet of connected devices. The latest recommendations of the French Association of Biomedical Engineers (AFIB) call in particular to be more demanding vis-\u00e0-vis suppliers and to fight against the obsolescence of equipment. Advens also advocates the <strong>adoption of an &#8220;immune&#8221; posture<\/strong> that aims to detect cyber threats as early as possible to reduce their impact. This response strategy is based on a set of protection, detection and response services that very often begin with an audit phase.<\/p>\n\n\n\n<p>This simple and effective step makes it possible to <strong>know the level of safety of the biomedical park<\/strong>. R\u00e9mi Martin de Abia, Advens auditor, recently carried out an external penetration test for a CHU. Through a search for domain names and subdomains, he discovers two important vulnerabilities that allow access to the system and then to patient records. For example, you can read comments on X-rays. R\u00e9mi adds:<\/p>\n\n\n\n<figure id=\"block-citation-1521136465\" class=\"acf-block-citation  mb-4\">\n  <blockquote class=\"blockquote\">\n    <p class=\"fs-3\">&#8220;For the attacker, attacking an office workstation at the reception or a scanner in the radiology room is tantamount to exploiting classic vulnerabilities: he might not even know the difference between the two machines!&#8221; Worrying in view of the stakes, which are beyond measure.&#8221;<\/p>\n  <\/blockquote>\n  <div class=\"d-flex align-items-center justify-content-start gap-3 gap-xl-4\">\n        <figcaption class=\"blockquote-footer text-end d-flex flex-wrap align-items-center justify-content-end m-0\">\n      <strong>R\u00e9mi Martin de Abia<\/strong>\n      <span class=\"mx-1\">\u2022<\/span>\n      <span>Auditor<\/span>\n    <\/figcaption>\n  <\/div>\n<\/figure>\n\n\n\n<p>The audit report therefore makes it possible to become <strong>aware of the vulnerabilities and risks involved<\/strong>, but it can also serve the CISO in his annual budget negotiation or be used as a basis for discussion with biomedical equipment manufacturers. Either a first step towards a better security of this park like no other!<\/p>\n\n\n\n<p><strong>So where do we start to strengthen the security of the biomedical park? A simple mapping of this perimeter can already be a very rewarding first step.<\/strong><\/p>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished in any case by particularly critical issues. Health-specific operational systems Medical imaging, appointment scheduling, remote consultations, IT has become ubiquitous in healthcare facilities and in the patient care pathway. Biomedical informatics thus [&hellip;]<\/p>\n","protected":false},"author":43,"featured_media":23917,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"content-type":"","footnotes":""},"categories":[468],"tags":[],"custom_format":[],"class_list":["post-23916","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-strategy"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.8.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biomedical and cybersecurity: specific challenges? - Advens<\/title>\n<meta name=\"description\" content=\"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biomedical and cybersecurity: specific challenges? - Advens\" \/>\n<meta property=\"og:description\" content=\"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\" \/>\n<meta property=\"og:site_name\" content=\"Advens\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-19T13:12:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-20T04:24:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.advens.test\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"540\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"madina.ehsan\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\"},\"author\":{\"name\":\"madina.ehsan\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\"},\"headline\":\"Biomedical and cybersecurity: specific challenges?\",\"datePublished\":\"2025-05-19T13:12:42+00:00\",\"dateModified\":\"2025-05-20T04:24:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\"},\"wordCount\":519,\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp\",\"articleSection\":[\"Cyber Strategy\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\",\"url\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\",\"name\":\"Biomedical and cybersecurity: specific challenges? - Advens\",\"isPartOf\":{\"@id\":\"https:\/\/www.advens.test\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp\",\"datePublished\":\"2025-05-19T13:12:42+00:00\",\"dateModified\":\"2025-05-20T04:24:20+00:00\",\"description\":\"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished\",\"breadcrumb\":{\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp\",\"width\":1024,\"height\":540,\"caption\":\"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished in any case by particularly critical issues.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.advens.test\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Strat\u00e9gie\",\"item\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/cyber-strategie\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Biomedical and cybersecurity: specific challenges?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.advens.test\/#website\",\"url\":\"https:\/\/www.advens.test\/\",\"name\":\"Advens\",\"description\":\"For Cyber, People &amp; Planet\",\"publisher\":{\"@id\":\"https:\/\/www.advens.test\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.advens.test\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.advens.test\/#organization\",\"name\":\"Advens\",\"url\":\"https:\/\/www.advens.test\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"contentUrl\":\"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png\",\"width\":1501,\"height\":1501,\"caption\":\"Advens\"},\"image\":{\"@id\":\"https:\/\/www.advens.test\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/advens\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b\",\"name\":\"madina.ehsan\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.advens.test\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g\",\"caption\":\"madina.ehsan\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biomedical and cybersecurity: specific challenges? - Advens","description":"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/","og_locale":"en_US","og_type":"article","og_title":"Biomedical and cybersecurity: specific challenges? - Advens","og_description":"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished","og_url":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/","og_site_name":"Advens","article_published_time":"2025-05-19T13:12:42+00:00","article_modified_time":"2025-05-20T04:24:20+00:00","og_image":[{"width":1024,"height":540,"url":"https:\/\/www.advens.test\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","type":"image\/webp"}],"author":"madina.ehsan","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#article","isPartOf":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/"},"author":{"name":"madina.ehsan","@id":"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b"},"headline":"Biomedical and cybersecurity: specific challenges?","datePublished":"2025-05-19T13:12:42+00:00","dateModified":"2025-05-20T04:24:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/"},"wordCount":519,"publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"image":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","articleSection":["Cyber Strategy"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/","url":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/","name":"Biomedical and cybersecurity: specific challenges? - Advens","isPartOf":{"@id":"https:\/\/www.advens.test\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage"},"image":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage"},"thumbnailUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","datePublished":"2025-05-19T13:12:42+00:00","dateModified":"2025-05-20T04:24:20+00:00","description":"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished","breadcrumb":{"@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#primaryimage","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","width":1024,"height":540,"caption":"Is biomedical informatics a computer like any other? Directly linked to medical equipment, it supports the core of hospital activity and is distinguished in any case by particularly critical issues."},{"@type":"BreadcrumbList","@id":"https:\/\/www.advens.test\/en\/cyber-strategy\/biomedical-and-cybersecurity-specific-challenges\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.advens.test\/en\/"},{"@type":"ListItem","position":2,"name":"Cyber Strat\u00e9gie","item":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/media\/cyber-strategie\/"},{"@type":"ListItem","position":3,"name":"Biomedical and cybersecurity: specific challenges?"}]},{"@type":"WebSite","@id":"https:\/\/www.advens.test\/#website","url":"https:\/\/www.advens.test\/","name":"Advens","description":"For Cyber, People &amp; Planet","publisher":{"@id":"https:\/\/www.advens.test\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.advens.test\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.advens.test\/#organization","name":"Advens","url":"https:\/\/www.advens.test\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/","url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","contentUrl":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/07\/Logotype-aDvens-Cybersecurity.png","width":1501,"height":1501,"caption":"Advens"},"image":{"@id":"https:\/\/www.advens.test\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/advens\/"]},{"@type":"Person","@id":"https:\/\/www.advens.test\/#\/schema\/person\/fbee09589096dfa5c0174a35889b1f9b","name":"madina.ehsan","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.advens.test\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7af81f4666f59e49927d5ef1534cdde8?s=96&d=mm&r=g","caption":"madina.ehsan"}}]}},"featured_url":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/app\/uploads\/2025\/05\/Biomedical-and-cybersecurity-specific-challenges-Advens.webp","_links":{"self":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/23916","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/users\/43"}],"replies":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/comments?post=23916"}],"version-history":[{"count":1,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/23916\/revisions"}],"predecessor-version":[{"id":23922,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/posts\/23916\/revisions\/23922"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media\/23917"}],"wp:attachment":[{"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/media?parent=23916"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/categories?post=23916"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/tags?post=23916"},{"taxonomy":"format","embeddable":true,"href":"https:\/\/www.nifty-shtern.217-160-68-194.plesk.page\/en\/wp-json\/wp\/v2\/custom_format?post=23916"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}