{"id":1826,"date":"2023-01-31T15:36:00","date_gmt":"2023-01-31T15:36:00","guid":{"rendered":"https:\/\/www.arthurlawrence.net\/blog\/?p=1826"},"modified":"2024-04-05T12:05:00","modified_gmt":"2024-04-05T12:05:00","slug":"future-cybersecurity-trends","status":"publish","type":"post","link":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/","title":{"rendered":"Future Cybersecurity Trends To Look Out For In 2023"},"content":{"rendered":"<blockquote>\n<p style=\"text-align: center;\"><strong><em>&#8220;<\/em><\/strong><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/cybersecurityventures.com\/jobs\/\" target=\"_blank\" rel=\"noopener\"><strong><em>Nearly 3.5 million cybersecurity job openings are waiting to be filled in 2023<\/em><\/strong><\/a><\/span><strong><em>.&#8221;<\/em><\/strong><\/p>\n<\/blockquote>\n<p>Cybersecurity is a rapidly evolving field, and individuals and organizations must stay informed about the latest trends and threats to protect themselves from cyber attacks. The growing amount of personal and sensitive information being shared online and the continued reliance on technology for daily life and business operations makes future cybersecurity a critical issue for everyone.<\/p>\n<p>Keeping up with the latest cybersecurity trends can help you understand the potential risks and threats and take the necessary steps to safeguard your sensitive information. This blog will explore the potential cybersecurity future and its trends to look out for in 2023.<\/p>\n<h2><strong>Future Cybersecurity Trends to Look Out for In Today&#8217;s Time <\/strong><strong>\u00a0<\/strong><\/h2>\n<p>In 2023, we can expect to see some key cybersecurity trends that organizations and individuals should be aware of:<\/p>\n<h3><strong>Increase in Remote Work<\/strong><\/h3>\n<p>With more companies embracing remote work due to the pandemic, we can expect to see an increase in cyber-attacks targeting remote workers and their devices. Security protocols like Multi-Factor Authentication (MFA), which demands additional authentication steps to prove the user&#8217;s identity before granting access to systems or data, should be considered by organizations. MFA can add an extra layer of security against bad actors who might try to access accounts using credentials that have been stolen.<\/p>\n<p>Businesses should think about creating guidelines and policies for protecting employee devices. This might entail giving staff members private virtual private networks (VPNs) for remote connections as well as secure antivirus software. Employees should also receive training on the dangers of using public networks, the value of using strong passwords, and separate passwords for each account.<\/p>\n<h3><strong>Cloud Security<\/strong><\/h3>\n<p>As more and more organizations move their data and applications to the cloud, cloud security will become a top priority. Expect more advanced cloud security solutions and services to protect against data breaches and attacks. While this is helping these organizations become more efficient, productive, and frequently safer, it also brings several new security concerns. Many of these are fueled by the lack of clarity on who is responsible for implementing and maintaining security in cloud deployments.<\/p>\n<p>As attacks on software supply chains, which target less secure elements of the supply chain, are expected to become more severe in the coming year, an overreliance on the cloud without regard for the security of the cloud&#8217;s applications and services can expose business-critical applications to threats.<\/p>\n<h3><strong>Artificial Intelligence and Machine Learning<\/strong><\/h3>\n<p>As these technologies become more advanced, attackers will start to use them to automate and scale their attacks. Organizations must invest in AI and ML-based security solutions to keep up. Large amounts of data can be quickly and accurately analyzed with AI and ML, enabling more effective threat detection and prevention. AI can, for instance, identify malicious activity or suspicious behavior on a network, such as increased traffic from a particular source or user activity patterns.<\/p>\n<p>By leveraging machine learning algorithms, businesses can also identify anomalies and prioritize alerts that may indicate a potential breach. Additionally, specific cybersecurity tasks like patch management, malware detection, and compliance checks can be automated using AI and ML. This enables businesses to save the time and money that would otherwise be required to carry out manual processes. Furthermore, using AI and ML can assist organizations in reducing the risk of false positives and ensuring that only the most critical security events are flagged.<\/p>\n<h3><strong>Internet of Things (IoT) Security<\/strong><\/h3>\n<p>The Internet of Things (IoT) is becoming increasingly prevalent in the coming years, with more and more devices being connected to the internet. This growth in connected devices is likely to bring new security challenges, as these devices may be vulnerable to hacking and other cyber-attacks. As a result, there is expected to be an increased focus on IoT security, including developing new technologies and strategies to protect these devices from cyber threats. Additionally, organizations and governments are expected to implement regulations to ensure that manufacturers incorporate security measures into their IoT devices.<\/p>\n<h3><strong>Quantum Computing and Cryptography<\/strong><\/h3>\n<p>With the advent of quantum computing, we can expect to see a shift in how cryptography is used to secure data. Organizations must start preparing for this transition and invest in quantum-resistant security solutions.<\/p>\n<h3><strong>Outsourcing Cybersecurity <\/strong><\/h3>\n<p>The complexity of managing cybersecurity for an organization alone has increased significantly. Most organizations lack the knowledge and resources necessary to run a full-fledged security operations center and expertise in cybersecurity (SOC). Because of the overburden of security teams and the severe lack of cybersecurity talent, it is challenging to hire and retain security professionals. These factors will force many organizations to develop new ideas, such as outsourcing their ongoing security operations to a seasoned consulting firm or using a virtual CISO for leadership.<\/p>\n<p>It&#8217;s important to note that these are just a few examples. The cybersecurity landscape is continuously changing, so staying informed and taking proactive steps to protect yourself and your organization is essential.<\/p>\n<h2><strong>Conclusion <\/strong><\/h2>\n<p>In conclusion, cybersecurity is constantly changing as new technologies, and threats emerge. It&#8217;s important to remember that as we use technology more and more in our daily lives, it&#8217;s essential for people, businesses, and governments to stay up to date on the latest cybersecurity trends and take preventative measures to safeguard themselves from online threats. This entails establishing strong security measures, keeping software and systems current, and educating staff members and users about cyber threats and online safety.<\/p>\n<p>Overall, cybersecurity is exciting, challenging, and ever-evolving, so it&#8217;s critical to be vigilant and persistent in adapting to new threats and technologies. Arthur Lawrence is surely the right choice you can depend on if you&#8217;re looking to outsource your cybersecurity. Their services range from audit and assessment services to fractional CISO and vulnerability management. They examine the ways in which their specialists can evaluate your current cybersecurity program and create a plan to help you meet your compliance and risk management goals.<\/p>\n<p><strong>Also Read: <\/strong><span style=\"color: #3366ff;\"><a style=\"color: #3366ff;\" href=\"https:\/\/www.arthurlawrence.net\/blog\/what-are-cybersecurity-solutions\/\" target=\"_blank\" rel=\"noopener\">What are Cybersecurity Solutions? Everything You Need to Know!<\/a><\/span><strong><br \/>\n<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.","protected":false},"author":2,"featured_media":2897,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5,10,192,2],"tags":[341,340],"class_list":["post-1826","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-careers","category-digital-transformation","category-home","tag-cybersecurity-future","tag-cybersecurity-trends"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Future Cybersecurity Trends To Look Out For In 2023<\/title>\n<meta name=\"description\" content=\"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Future Cybersecurity Trends To Look Out For In 2023\" \/>\n<meta property=\"og:description\" content=\"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/arthurlawrenceworldwide\" \/>\n<meta property=\"article:published_time\" content=\"2023-01-31T15:36:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-04-05T12:05:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"473\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Arthur Lawrence\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Future Cybersecurity Trends To Look Out For In 2023\" \/>\n<meta name=\"twitter:description\" content=\"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.\" \/>\n<meta name=\"twitter:creator\" content=\"@arthurlawrence_\" \/>\n<meta name=\"twitter:site\" content=\"@arthurlawrence_\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Arthur Lawrence\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\"},\"author\":{\"name\":\"Arthur Lawrence\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386\"},\"headline\":\"Future Cybersecurity Trends To Look Out For In 2023\",\"datePublished\":\"2023-01-31T15:36:00+00:00\",\"dateModified\":\"2024-04-05T12:05:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\"},\"wordCount\":997,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp\",\"keywords\":[\"cybersecurity future\",\"cybersecurity trends\"],\"articleSection\":[\"Blog\",\"Careers\",\"Digital Transformation\",\"Home\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\",\"name\":\"Future Cybersecurity Trends To Look Out For In 2023\",\"isPartOf\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp\",\"datePublished\":\"2023-01-31T15:36:00+00:00\",\"dateModified\":\"2024-04-05T12:05:00+00:00\",\"description\":\"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp\",\"contentUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp\",\"width\":1200,\"height\":473,\"caption\":\"Cybersecurity Trends\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.arthurlawrence.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Future Cybersecurity Trends To Look Out For In 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#website\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/\",\"name\":\"Arthur Lawrence\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\"},\"alternateName\":\"AL\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.arthurlawrence.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#organization\",\"name\":\"Arthur Lawrence\",\"alternateName\":\"AL\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png\",\"width\":81,\"height\":89,\"caption\":\"Arthur Lawrence\"},\"image\":{\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/arthurlawrenceworldwide\",\"https:\/\/x.com\/arthurlawrence_\",\"https:\/\/www.linkedin.com\/company\/arthur-lawrence\/\",\"https:\/\/www.youtube.com\/user\/arthurlawrenceus\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386\",\"name\":\"Arthur Lawrence\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g\",\"caption\":\"Arthur Lawrence\"},\"sameAs\":[\"http:\/\/www.arthurlawrence.net\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Future Cybersecurity Trends To Look Out For In 2023","description":"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/","og_locale":"en_US","og_type":"article","og_title":"Future Cybersecurity Trends To Look Out For In 2023","og_description":"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.","og_url":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/arthurlawrenceworldwide","article_published_time":"2023-01-31T15:36:00+00:00","article_modified_time":"2024-04-05T12:05:00+00:00","og_image":[{"width":1200,"height":473,"url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp","type":"image\/webp"}],"author":"Arthur Lawrence","twitter_card":"summary_large_image","twitter_title":"Future Cybersecurity Trends To Look Out For In 2023","twitter_description":"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.","twitter_creator":"@arthurlawrence_","twitter_site":"@arthurlawrence_","twitter_misc":{"Written by":"Arthur Lawrence","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#article","isPartOf":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/"},"author":{"name":"Arthur Lawrence","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386"},"headline":"Future Cybersecurity Trends To Look Out For In 2023","datePublished":"2023-01-31T15:36:00+00:00","dateModified":"2024-04-05T12:05:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/"},"wordCount":997,"commentCount":0,"publisher":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp","keywords":["cybersecurity future","cybersecurity trends"],"articleSection":["Blog","Careers","Digital Transformation","Home"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/","url":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/","name":"Future Cybersecurity Trends To Look Out For In 2023","isPartOf":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage"},"thumbnailUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp","datePublished":"2023-01-31T15:36:00+00:00","dateModified":"2024-04-05T12:05:00+00:00","description":"Stay ahead of the game and protect yourself from cyber threats with our comprehensive guide on the top cybersecurity future trends to look out for in 2023.","breadcrumb":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#primaryimage","url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp","contentUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2023\/01\/3k2.webp","width":1200,"height":473,"caption":"Cybersecurity Trends"},{"@type":"BreadcrumbList","@id":"https:\/\/www.arthurlawrence.net\/blog\/future-cybersecurity-trends\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.arthurlawrence.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Future Cybersecurity Trends To Look Out For In 2023"}]},{"@type":"WebSite","@id":"https:\/\/www.arthurlawrence.net\/blog\/#website","url":"https:\/\/www.arthurlawrence.net\/blog\/","name":"Arthur Lawrence","description":"","publisher":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization"},"alternateName":"AL","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.arthurlawrence.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.arthurlawrence.net\/blog\/#organization","name":"Arthur Lawrence","alternateName":"AL","url":"https:\/\/www.arthurlawrence.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png","contentUrl":"https:\/\/www.arthurlawrence.net\/blog\/wp-content\/uploads\/2020\/08\/Arthur-Lawrence-Blog-Logo.png","width":81,"height":89,"caption":"Arthur Lawrence"},"image":{"@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/arthurlawrenceworldwide","https:\/\/x.com\/arthurlawrence_","https:\/\/www.linkedin.com\/company\/arthur-lawrence\/","https:\/\/www.youtube.com\/user\/arthurlawrenceus"]},{"@type":"Person","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/40e2e730df4dbdfba82e45c7bfd4d386","name":"Arthur Lawrence","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.arthurlawrence.net\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f181090f9b1ab21acc79d48f0b9ad2ac?s=96&d=mm&r=g","caption":"Arthur Lawrence"},"sameAs":["http:\/\/www.arthurlawrence.net"]}]}},"_links":{"self":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts\/1826"}],"collection":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/comments?post=1826"}],"version-history":[{"count":0,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/posts\/1826\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/media\/2897"}],"wp:attachment":[{"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/media?parent=1826"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/categories?post=1826"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.arthurlawrence.net\/blog\/wp-json\/wp\/v2\/tags?post=1826"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}