{"id":37682,"date":"2019-06-11T09:57:17","date_gmt":"2019-06-11T09:57:17","guid":{"rendered":"https:\/\/www.42gears.com\/?p=37682"},"modified":"2023-01-13T06:27:51","modified_gmt":"2023-01-13T06:27:51","slug":"why-healthcare-must-rethink-security-protocols","status":"publish","type":"post","link":"https:\/\/www.42gears.com\/fr\/blog\/why-healthcare-must-rethink-security-protocols\/","title":{"rendered":"Why healthcare must rethink security protocols"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignnone size-full wp-image-37721\" src=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Why-healthcare-must-rethink-security-protocols.jpg\" alt=\"Why healthcare must rethink security protocols\" width=\"1171\" height=\"385\" srcset=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Why-healthcare-must-rethink-security-protocols.jpg 1171w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Why-healthcare-must-rethink-security-protocols-300x99.jpg 300w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Why-healthcare-must-rethink-security-protocols-768x253.jpg 768w, https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Why-healthcare-must-rethink-security-protocols-1024x337.jpg 1024w\" sizes=\"(max-width: 1171px) 100vw, 1171px\" \/><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Security threats have wreaked havoc across sectors, but no other industry stands to lose as much as the healthcare industry does. Because they deal with lives, every single day. So if there\u2019s one industry that cannot afford to make a wrong call, it\u2019s healthcare. And healthcare professionals are only too aware of this. But in an era where data is a currency, aren\u2019t information security officials as much responsible for patients as doctors are?<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">The hospital staff deals with a lot of data &#8211; real-time vitals that are crucial for doctors to decide on a course of treatment, stats in the OR that help doctors make decisions during surgeries, medical history that helps healthcare professionals come to a diagnosis and so on. Imagine a cyberattack that bars access to all this data &#8211; until a ransom is paid or a certain deal is struck. Doesn\u2019t paint a pretty picture, does it? <\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Now, there\u2019s also the issue of securing the scores of mobile devices that healthcare professionals use to access\/store information. In addition, there is a plethora of connected devices (medical equipment) that has to be secured and kept updated at all times. And all of this should be reason enough for IT professionals in healthcare to roll up their sleeves and get to work.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\"> Let\u2019s take a look at the aspects of information security healthcare organizations must consider while taking measures to up their defenses.<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 22px;\"><b>Cloud Security<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Healthcare institutions deal with tons of confidential data. So compliance and security risks are, no doubt, major considerations. As such, operating workloads in the cloud is quite a challenge for their IT staff as the traffic to and from cloud needs close monitoring. Attacking a cloud server is comparatively easier as miscreants not have to worry about on-premise components. And that makes protecting the data on cloud even more difficult.<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 22px;\"><b>Ransomware<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Off late, ransomware has become a major security threat. Most of these are propagated through phishing, which tricks users into giving out information or facilitating malicious networks. So, it\u2019s imperative for healthcare organizations to identify the weak spots in their security and fortifying them instead of trying to figure out ways in which miscreants could leverage malware to cause harm. Healthcare institutions must work towards improving visibility into how data traffic flows within the organization to uncover patterns of ransomware. They need to protect both internal and external threat surfaces. And that cannot be done using technology alone, it must be user-driven.<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 22px;\"><b>Unsecured Mobile Devices<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">As far as security is concerned, the hundreds of mobile devices being used by employees have only made matters worse. BYOD in healthcare calls for stricter policies that take every aspect into account. As employees go mobile, the chances of data being leaked, whether intentionally or unintentionally, rises exponentially. Plus there is the question of granting them access to different systems &#8211; systems that have a wealth of information which, in the wrong hands, could be catastrophic. Thus, it\u2019s crucial for healthcare organizations to be able to monitor the flow of data in real-time.<\/span><\/p>\n<h2 style=\"text-align: left; font-size: 22px;\"><b>IoT Exploits<\/b><\/h2>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">Connected devices have brought in great opportunities for healthcare, both in terms of improving care quality and easing administration. However, they have brought in a new set of challenges to deal with, data privacy and security topping the list. Most implantable IoT devices and wearables are vulnerable to attack. So the proliferation of such devices have raised concerns regarding data collection, processing and transmission &#8211; concerns that must be addressed immediately.<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"font-weight: 400;\">That\u2019s precisely why healthcare institutions must consider endpoint security. The use of UEM solutions in healthcare has been slowly gaining momentum as endpoint management solutions can help safeguard both data and devices. <a href=\"https:\/\/www.42gears.com\/solutions\/unified-endpoint-management-uem-solution\/\">42Gears UEM<\/a> can help secure, monitor and manage touch points across facilities. <a href=\"https:\/\/suremdm.42gears.com\/console\/?registration=true&amp;uem=true\">Try 42Gears for free<\/a>.<\/span><\/p>\n<p style=\"text-align: left;\">\n","protected":false},"excerpt":{"rendered":"<p>Security threats have wreaked havoc across sectors, but no other industry stands to lose as much as the healthcare industry does. Because they deal with lives, every single day. So if there\u2019s one industry that cannot afford to make a wrong call, it\u2019s healthcare. And healthcare professionals are only too aware of this. But in&hellip;<\/p>\n","protected":false},"author":7,"featured_media":37728,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10,8,398,399],"tags":[266,368,361,379],"class_list":["post-37682","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-general","category-uem","category-unified-endpoint-management","tag-healthcare","tag-mobile-security","tag-uem","tag-unified-endpoint-management"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.6 (Yoast SEO v24.6) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Information SWhat Should IT Look For While Evaluating A UEM Solution? | 42Gears<\/title>\n<meta name=\"description\" content=\"42Gear&#039;s blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\" \/>\n<meta property=\"og:locale\" content=\"fr_FR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why healthcare must rethink security protocols\" \/>\n<meta property=\"og:description\" content=\"42Gear&#039;s blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\" \/>\n<meta property=\"og:site_name\" content=\"42Gears Mobility Systems\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/42gears\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-11T09:57:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-01-13T06:27:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"499\" \/>\n\t<meta property=\"og:image:height\" content=\"330\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"42Gears Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@42Gears\" \/>\n<meta name=\"twitter:site\" content=\"@42Gears\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"42Gears Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\"},\"author\":{\"name\":\"42Gears Team\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\"},\"headline\":\"Why healthcare must rethink security protocols\",\"datePublished\":\"2019-06-11T09:57:17+00:00\",\"dateModified\":\"2023-01-13T06:27:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\"},\"wordCount\":644,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg\",\"keywords\":[\"healthcare\",\"mobile security\",\"UEM\",\"Unified Endpoint Management\"],\"articleSection\":[\"Business\",\"General\",\"UEM\",\"Unified Endpoint Management\"],\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\",\"url\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\",\"name\":\"Information SWhat Should IT Look For While Evaluating A UEM Solution? | 42Gears\",\"isPartOf\":{\"@id\":\"https:\/\/www.42gears.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg\",\"datePublished\":\"2019-06-11T09:57:17+00:00\",\"dateModified\":\"2023-01-13T06:27:51+00:00\",\"description\":\"42Gear's blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#breadcrumb\"},\"inLanguage\":\"fr-FR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg\",\"width\":499,\"height\":330,\"caption\":\"Featured Image - Why healthcare must rethink security protocols-01\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.42gears.com\/fr\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why healthcare must rethink security protocols\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.42gears.com\/#website\",\"url\":\"https:\/\/www.42gears.com\/\",\"name\":\"42Gears Mobility Systems\",\"description\":\"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown\",\"publisher\":{\"@id\":\"https:\/\/www.42gears.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.42gears.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"fr-FR\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.42gears.com\/#organization\",\"name\":\"MDM - 42Gears\",\"url\":\"https:\/\/www.42gears.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"contentUrl\":\"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png\",\"width\":499,\"height\":330,\"caption\":\"MDM - 42Gears\"},\"image\":{\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/42gears\",\"https:\/\/x.com\/42Gears\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d\",\"name\":\"42Gears Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"fr-FR\",\"@id\":\"https:\/\/www.42gears.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g\",\"caption\":\"42Gears Team\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information SWhat Should IT Look For While Evaluating A UEM Solution? | 42Gears","description":"42Gear's blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/","og_locale":"fr_FR","og_type":"article","og_title":"Why healthcare must rethink security protocols","og_description":"42Gear's blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.","og_url":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/","og_site_name":"42Gears Mobility Systems","article_publisher":"https:\/\/www.facebook.com\/42gears","article_published_time":"2019-06-11T09:57:17+00:00","article_modified_time":"2023-01-13T06:27:51+00:00","og_image":[{"width":499,"height":330,"url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","type":"image\/jpeg"}],"author":"42Gears Team","twitter_card":"summary_large_image","twitter_creator":"@42Gears","twitter_site":"@42Gears","twitter_misc":{"Written by":"42Gears Team","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#article","isPartOf":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/"},"author":{"name":"42Gears Team","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d"},"headline":"Why healthcare must rethink security protocols","datePublished":"2019-06-11T09:57:17+00:00","dateModified":"2023-01-13T06:27:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/"},"wordCount":644,"commentCount":0,"publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"image":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","keywords":["healthcare","mobile security","UEM","Unified Endpoint Management"],"articleSection":["Business","General","UEM","Unified Endpoint Management"],"inLanguage":"fr-FR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/","url":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/","name":"Information SWhat Should IT Look For While Evaluating A UEM Solution? | 42Gears","isPartOf":{"@id":"https:\/\/www.42gears.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage"},"image":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage"},"thumbnailUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","datePublished":"2019-06-11T09:57:17+00:00","dateModified":"2023-01-13T06:27:51+00:00","description":"42Gear's blog has everything you need to future-proof your business. Learn more about why healthcare must rethink security protocols.","breadcrumb":{"@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#breadcrumb"},"inLanguage":"fr-FR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/"]}]},{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#primaryimage","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","width":499,"height":330,"caption":"Featured Image - Why healthcare must rethink security protocols-01"},{"@type":"BreadcrumbList","@id":"https:\/\/www.42gears.com\/es\/blog\/why-healthcare-must-rethink-security-protocols\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.42gears.com\/fr\/"},{"@type":"ListItem","position":2,"name":"Why healthcare must rethink security protocols"}]},{"@type":"WebSite","@id":"https:\/\/www.42gears.com\/#website","url":"https:\/\/www.42gears.com\/","name":"42Gears Mobility Systems","description":"Mobile Device Management (MDM), Mobile Security &amp; Mobile Device Lockdown","publisher":{"@id":"https:\/\/www.42gears.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.42gears.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"fr-FR"},{"@type":"Organization","@id":"https:\/\/www.42gears.com\/#organization","name":"MDM - 42Gears","url":"https:\/\/www.42gears.com\/","logo":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","contentUrl":"https:\/\/www.42gears.com\/wp-content\/uploads\/2018\/12\/Featured-Image-42Gears-logo.png","width":499,"height":330,"caption":"MDM - 42Gears"},"image":{"@id":"https:\/\/www.42gears.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/42gears","https:\/\/x.com\/42Gears"]},{"@type":"Person","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/28a14f2c32de4a7903ac672579a88a2d","name":"42Gears Team","image":{"@type":"ImageObject","inLanguage":"fr-FR","@id":"https:\/\/www.42gears.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7d257fb658a429b8607872336eac3833a8314ca3ca67d72c90ceeddc7700c42e?s=96&d=mm&r=g","caption":"42Gears Team"}}]}},"author_meta":{"ID":"7","user_nicename":"42gears","user_email":"42gears@gmail.com","user_registered":"2015-07-15 04:55:37","display_name":"42Gears Team","first_name":"42Gears","last_name":"Team"},"featured_image_url":"https:\/\/www.42gears.com\/wp-content\/uploads\/2019\/06\/Featured-Image-Why-healthcare-must-rethink-security-protocols-01-1.jpg","_links":{"self":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/37682","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/comments?post=37682"}],"version-history":[{"count":6,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/37682\/revisions"}],"predecessor-version":[{"id":85255,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/posts\/37682\/revisions\/85255"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media\/37728"}],"wp:attachment":[{"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/media?parent=37682"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/categories?post=37682"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.42gears.com\/fr\/wp-json\/wp\/v2\/tags?post=37682"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}