
{"id":2719,"date":"2013-11-12T00:00:00","date_gmt":"2013-11-12T00:00:00","guid":{"rendered":"http:\/\/otava.test\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/"},"modified":"2013-11-12T00:00:00","modified_gmt":"2013-11-12T00:00:00","slug":"midwest-himss-fall-tech-conference-preparing-for-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/","title":{"rendered":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Midwest HIMSS Fall Tech Conference\" src=\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\" alt=\"Midwest HIMSS Fall Tech Conference\" width=\"290\" height=\"132\" \/>Online Tech is liveblogging from Milwaukee at <em>Rock IT Around the Clock<\/em>! That\u2019s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we\u2019re exhibiting our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting solutions<\/a>\u00a0at booth #501. Here&#8217;s our takeaways from a session on cyber security:<\/p>\n<p><strong>Session: Cyber Attacks from Shanghai: Prepared? <\/strong><br \/>\n<em>Speaker: Ali Pabrai<\/em><\/p>\n<p>Firewalls are our first line of defense!<\/p>\n<p><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Antivirus<\/a> control<\/p>\n<ul>\n<li>Many vulnerabilities enter the network via employees\u2019 email activities.<\/li>\n<\/ul>\n<p>Authentication control<\/p>\n<ul>\n<li>This is a critical area<\/li>\n<li>We struggle with password management and credential information. It can lead to more problems.<\/li>\n<\/ul>\n<p>Key: <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">Encrypt<\/a> all passwords during transmission and storage on all system components.\u00a0There are too many generic accounts (physician accounts, and nurse accounts, etc.)<\/p>\n<p>Implement two-factor authentication for remote access.<\/p>\n<ul>\n<li>We\u2019re going to get more, not less remote access<\/li>\n<li>When OCR does audits, one of the questions they ask is whether or not you have <strong><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a><\/strong>.<\/li>\n<li>Especially people who have to meet more than just <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> requrements (like <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a>), it\u2019s a mandate for other compliances<\/li>\n<\/ul>\n<p>Audit Log consolidation control.<\/p>\n<ul>\n<li>Establish process for linking all access to system components (especially privileged access such as root) to each individual.<\/li>\n<li>Implement automated audit trails for all system components to reconstruct the event.<\/li>\n<li>Secure these audit trails so they cannot be altered.<\/li>\n<\/ul>\n<p>*****Keys: review logs for all system components at least daily, and retain audit trail history for at least one year, with a minimum of 3 months online availability<\/p>\n<p>1 in 4 breaches lead to identity theft (in 2012)<\/p>\n<p>Encryption: Last line of defense!!<\/p>\n<ul>\n<li>Develop an encryption policy<\/li>\n<li>Establish standards for encryption across data at rest and data in motion<\/li>\n<li>Ensure enforcement of policy and standards across enterprise<\/li>\n<li>Implement additional controls as needed<\/li>\n<\/ul>\n<p>If there\u2019s one control that should have the floodlights on it, it\u2019s encryption. It\u2019s one of the most important things to implement in 2014 and beyond. And encryption should be looked at from a dozen different places.<\/p>\n<p>THE BOTTOM LINE: What is your enterprise standard for encryption, from mobile devices to cloud computing?<\/p>\n<ul>\n<li>For consistency<\/li>\n<li>During audits, a lot of inconsistency is found<\/li>\n<li>The entire healthcare IT fabric is changing. From mobile, all the way to cloud. Lots of information is moving to the cloud.<\/li>\n<li>It\u2019s hard for information in the cloud to be meeting the requirements of the HIPAA rule.<\/li>\n<li>You have to ensure that your BAAs have been updated to reflect the changes associated with CSPs.<\/li>\n<\/ul>\n<p>Unsecured PII, Breach notification mandate:<\/p>\n<ul>\n<li>Organizations must provide required breach notification<\/li>\n<li>You have to encrypt or destroy your information.<\/li>\n<li>Huge risks: copier breaches, lost USB devices, stolen laptops.<\/li>\n<li>Cyber attacks are not highly targeted, thoroughly researched, amply funded, designed to evade detection, multi-modal\/multi-step and tailored to a particular organization.<\/li>\n<\/ul>\n<p>Assume that your organization might already have been compromised, and start from there.\u00a0What have you deployed? You may have a firewall and antivirus, but if you don\u2019t have two factor, or mobile device management or device encryption, there\u2019s still work to be done.<\/p>\n<p>Seven steps to enterprise security:<\/p>\n<ul>\n<li>Security responsibility<\/li>\n<li>Risk analysis<\/li>\n<li>Security strategy and policies<\/li>\n<li>Remediate<\/li>\n<li>Secure third parties<\/li>\n<li>Training (more robust and complete than just 30 minutes once a year)<\/li>\n<li>Evaluate<\/li>\n<li>THEN\u2026REPEAT<\/li>\n<\/ul>\n<p>This helps availability, integrity, and confidentiality.<\/p>\n<p>\u201cVictorious warriors win first and then go to war, while defeated warriors go to war first and then seek to win.\u201d \u2013The Art of War<\/p>\n<p>Are you converting those security incidents into security intelligence?<br \/>\n***Get your enterprise security system security plan developed***<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That\u2019s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we\u2019re exhibiting our\u00a0HIPAA hosting solutions\u00a0at booth #501. Here&#8217;s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees\u2019 email activities. Authentication control This is a critical area We struggle with password management and credential information. It can lead to more problems. Key: Encrypt all passwords during transmission and storage on all system components.\u00a0There are too many generic accounts (physician accounts, and nurse accounts, etc.) Implement two-factor authentication for remote access. We\u2019re going to get more, not less remote access When OCR does audits, one of the questions they ask is whether or not you have two-factor authentication. Especially people who have to meet more than just HIPAA requrements (like PCI), it\u2019s a mandate for other compliances Audit Log consolidation control. Establish process for linking all access to system components (especially privileged access such as root) to each individual. Implement automated audit trails for all system components to reconstruct the event&#8230;.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2719","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks\" \/>\n<meta property=\"og:description\" content=\"Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That\u2019s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we\u2019re exhibiting our\u00a0HIPAA hosting solutions\u00a0at booth #501. Here&#8217;s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees\u2019 email activities. Authentication control This is a critical area We struggle with password management and credential information. It can lead to more problems. Key: Encrypt all passwords during transmission and storage on all system components.\u00a0There are too many generic accounts (physician accounts, and nurse accounts, etc.) Implement two-factor authentication for remote access. We\u2019re going to get more, not less remote access When OCR does audits, one of the questions they ask is whether or not you have two-factor authentication. Especially people who have to meet more than just HIPAA requrements (like PCI), it\u2019s a mandate for other compliances Audit Log consolidation control. Establish process for linking all access to system components (especially privileged access such as root) to each individual. Implement automated audit trails for all system components to reconstruct the event....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-11-12T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks\",\"datePublished\":\"2013-11-12T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\"},\"wordCount\":589,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\",\"url\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\",\"name\":\"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\",\"datePublished\":\"2013-11-12T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\",\"contentUrl\":\"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks","og_description":"Online Tech is liveblogging from Milwaukee at Rock IT Around the Clock! That\u2019s the theme for the HIMSS Midwest Area Chapters Fall Technology Conference November 10-12, where we\u2019re exhibiting our\u00a0HIPAA hosting solutions\u00a0at booth #501. Here&#8217;s our takeaways from a session on cyber security: Session: Cyber Attacks from Shanghai: Prepared? Speaker: Ali Pabrai Firewalls are our first line of defense! Antivirus control Many vulnerabilities enter the network via employees\u2019 email activities. Authentication control This is a critical area We struggle with password management and credential information. It can lead to more problems. Key: Encrypt all passwords during transmission and storage on all system components.\u00a0There are too many generic accounts (physician accounts, and nurse accounts, etc.) Implement two-factor authentication for remote access. We\u2019re going to get more, not less remote access When OCR does audits, one of the questions they ask is whether or not you have two-factor authentication. Especially people who have to meet more than just HIPAA requrements (like PCI), it\u2019s a mandate for other compliances Audit Log consolidation control. Establish process for linking all access to system components (especially privileged access such as root) to each individual. Implement automated audit trails for all system components to reconstruct the event....","og_url":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/","og_site_name":"OTAVA","article_published_time":"2013-11-12T00:00:00+00:00","og_image":[{"url":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks","datePublished":"2013-11-12T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/"},"wordCount":589,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/","url":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/","name":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg","datePublished":"2013-11-12T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#primaryimage","url":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg","contentUrl":"https:\/\/www.falltechnologyconference.org\/graphics\/t829l3\/fmw.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/midwest-himss-fall-tech-conference-preparing-for-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Midwest HIMSS Fall Tech Conference: Preparing for Cyber Attacks"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2719","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2719"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2719\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2719"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2719"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2719"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2719"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}