{"id":19618,"date":"2024-09-11T22:30:35","date_gmt":"2024-09-12T02:30:35","guid":{"rendered":"https:\/\/www.certitrek.com\/nlpa\/?p=19618"},"modified":"2025-06-24T05:33:17","modified_gmt":"2025-06-24T09:33:17","slug":"navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement","status":"publish","type":"post","link":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/","title":{"rendered":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement"},"content":{"rendered":"<p>With AI&#8217;s lightning-speed evolution, supply chain attacks are expected to become even more sophisticated and harder to detect, putting procurement and logistics professionals on high alert. These attacks will target vulnerabilities within supplier networks, compromising software, hardware, and third-party vendors. Understanding and mitigating these risks are essential to maintaining the integrity and resilience of supply chains. Companies like  are now taking proactive steps to reinforce their systems and vendor ecosystems against these growing threats.<\/p>\n<h5><strong>Understanding Supply Chain Attacks<\/strong><\/h5>\n<p>Supply chain attacks involve malicious actors exploiting weaknesses within an organization&#8217;s supply chain to gain unauthorized access. Common types include software compromises, counterfeit hardware, and attacks on third-party suppliers. Notable incidents, such as the <a href=\"https:\/\/en.wikipedia.org\/wiki\/NotPetya\" target=\"_new\" rel=\"noopener\">NotPetya attack<\/a>, highlight how deeply these attacks can infiltrate and disrupt operations. For professionals in procurement and logistics, staying informed about these threats is critical.<\/p>\n<p>For more insights on how cyber security impacts procurement, check out our article on <a href=\"https:\/\/www.certitrek.com\/nlpa\/news\/purchasing-articles\/cyber-security\/\" target=\"_new\" rel=\"noopener\">Procurement and Cyber Security<\/a>.<\/p>\n<h5><strong>Key Criteria for Evaluating Cyber Security Providers<\/strong><\/h5>\n<p>When choosing a cyber security provider to protect against supply chain attacks, it\u2019s essential to look for expertise specific to this threat landscape. Providers should offer robust threat detection, rapid response capabilities, and deep knowledge of supply chain vulnerabilities. A focus on end-to-end security solutions that integrate seamlessly with existing operations is crucial.<\/p>\n<h5><strong>Evaluating Providers: Essential Questions<\/strong><\/h5>\n<p>Selecting the right provider involves asking the right questions. Does the provider have experience dealing with supply chain attacks? Can they demonstrate a successful track record? Do they offer real-time monitoring and rapid incident response? Procurement-specific concerns, like protecting sensitive supplier data, should also be addressed during evaluations. Forward-thinking organizations such as  are integrating these evaluation criteria into their procurement processes to strengthen cyber resilience.<\/p>\n<h5><strong>Case Studies to Learn From<\/strong><\/h5>\n<p>Analyzing past supply chain attacks offers valuable insights. For example, the NotPetya malware attack severely impacted global logistics, highlighting the need for robust cyber defenses. Case studies reveal common vulnerabilities and provide lessons on improving security measures within the procurement and logistics sectors.<\/p>\n<h5><strong>Budgeting and ROI for Cyber Security in Supply Chains<\/strong><\/h5>\n<p>Cyber breaches within the supply chain can be costly, leading to significant financial losses and severe damage to an organization&#8217;s reputation. Understanding the financial impact helps justify cyber security investments. Evaluating the ROI of security measures ensures that the organization is not only protected but also gaining value from its cyber security strategies.<\/p>\n<h5><strong>Emerging Trends in Supply Chain Security<\/strong><\/h5>\n<p>The future of supply chain security is rapidly evolving. Emerging technologies such as AI, machine learning, and blockchain offer new ways to fortify defenses against supply chain attacks. Staying ahead of these trends is vital for procurement professionals who must continuously adapt to an ever-changing threat landscape.<\/p>\n<h5><strong>Conclusion: Proactive Steps for Supply Chain Security<\/strong><\/h5>\n<p>Mitigating supply chain attacks requires a proactive approach. This includes selecting the right cyber security provider, staying informed about emerging threats, and continuously assessing and upgrading security measures. Procurement and logistics professionals looking to deepen their knowledge in managing supply risks and disruptions can benefit from training like our <a href=\"https:\/\/lms.nextlevelpurchasing.com\/course\/view.php?id=29\" target=\"_new\" rel=\"noopener\">Supply Risk and Sustainability Management course<\/a>. This program equips you with tools and strategies to anticipate, respond to, and recover from various supply disruptions, including cyberattacks.<\/p>\n<p>By implementing these strategies, procurement and logistics professionals can better protect their operations and maintain a secure, resilient supply chain.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With AI&#8217;s lightning-speed evolution, supply chain attacks are expected to [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":19619,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[485,103,29,429],"tags":[505,506,500,487,498,491,504,509,280,502,492,493,248,353,497,186,481,494,209,503,146,512,490,486,508,507,218,513,256,443,488,496,510,489,511,501,495,499],"class_list":["post-19618","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-in-supply-chain","category-risk-management","category-supply-chain","category-technology","tag-ai-in-supply-chain","tag-blockchain-security","tag-cyber-defense","tag-cyber-security","tag-cyber-security-providers","tag-cyber-threats","tag-emerging-trends","tag-incident-response","tag-logistics","tag-logistics-professionals","tag-malware","tag-notpetya","tag-procurement","tag-procurement-professionals","tag-procurement-security","tag-procurement-strategy","tag-procurement-training","tag-ransomware","tag-risk-management","tag-roi-in-cyber-security","tag-supplier-management","tag-supplier-risk","tag-supplier-security","tag-supply-chain-attacks","tag-supply-chain-best-practices","tag-supply-chain-case-studies","tag-supply-chain-disruption","tag-supply-chain-integrity","tag-supply-chain-management","tag-supply-chain-resilience","tag-supply-chain-security","tag-supply-chain-vulnerabilities","tag-supply-disruption-management","tag-supply-risk","tag-sustainability-management","tag-technology-in-supply-chain","tag-third-party-risk","tag-threat-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v19.4 (Yoast SEO v19.13) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement - Next Level Purchasing Association (NLPA)<\/title>\n<meta name=\"description\" content=\"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\" \/>\n<meta property=\"og:site_name\" content=\"Next Level Purchasing Association (NLPA)\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/NextLevelPurchasing\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-12T02:30:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-24T09:33:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2024\/09\/cyber-attack.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"mylene\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@nextlevelpurch\" \/>\n<meta name=\"twitter:site\" content=\"@nextlevelpurch\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"mylene\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\"},\"author\":{\"name\":\"mylene\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/56bfd4401c6931ba9e43c3c5a5a6a452\"},\"headline\":\"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement\",\"datePublished\":\"2024-09-12T02:30:35+00:00\",\"dateModified\":\"2025-06-24T09:33:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\"},\"wordCount\":563,\"publisher\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\"},\"keywords\":[\"AI in supply chain\",\"blockchain security\",\"cyber defense\",\"cyber security\",\"cyber security providers\",\"cyber threats\",\"emerging trends\",\"incident response\",\"logistics\",\"logistics professionals\",\"malware\",\"NotPetya\",\"procurement\",\"procurement professionals\",\"procurement security\",\"Procurement Strategy\",\"procurement training\",\"ransomware\",\"risk management\",\"ROI in cyber security\",\"Supplier management\",\"supplier risk\",\"supplier security\",\"supply chain attacks\",\"supply chain best practices\",\"supply chain case studies\",\"supply chain disruption\",\"supply chain integrity\",\"supply chain management\",\"supply chain resilience\",\"supply chain security\",\"supply chain vulnerabilities\",\"supply disruption management\",\"supply risk\",\"sustainability management\",\"technology in supply chain\",\"third-party risk\",\"threat detection\"],\"articleSection\":[\"Cyber Security in Supply Chain\",\"Risk Management\",\"Supply Chain\",\"Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\",\"name\":\"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement - Next Level Purchasing Association (NLPA)\",\"isPartOf\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#website\"},\"datePublished\":\"2024-09-12T02:30:35+00:00\",\"dateModified\":\"2025-06-24T09:33:17+00:00\",\"description\":\"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.certitrek.com\/nlpa\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#website\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/\",\"name\":\"Next Level Purchasing Association (NLPA)\",\"description\":\"The Next Level Purchasing Association\",\"publisher\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.certitrek.com\/nlpa\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#organization\",\"name\":\"Next Level Purchasing Association (NLPA)\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png\",\"contentUrl\":\"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png\",\"width\":149,\"height\":50,\"caption\":\"Next Level Purchasing Association (NLPA)\"},\"image\":{\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/next-level-purchasing-association\/\",\"https:\/\/www.youtube.com\/channel\/UCrNZYjcLcaNA4xMKQHEGamw\",\"https:\/\/www.facebook.com\/NextLevelPurchasing\/\",\"https:\/\/twitter.com\/nextlevelpurch\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/56bfd4401c6931ba9e43c3c5a5a6a452\",\"name\":\"mylene\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/be98bfe3e5dfd79e2436e864fd3fd8b6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/be98bfe3e5dfd79e2436e864fd3fd8b6?s=96&d=mm&r=g\",\"caption\":\"mylene\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement - Next Level Purchasing Association (NLPA)","description":"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/","og_locale":"en_US","og_type":"article","og_title":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement","og_description":"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.","og_url":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/","og_site_name":"Next Level Purchasing Association (NLPA)","article_publisher":"https:\/\/www.facebook.com\/NextLevelPurchasing\/","article_published_time":"2024-09-12T02:30:35+00:00","article_modified_time":"2025-06-24T09:33:17+00:00","og_image":[{"width":724,"height":483,"url":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2024\/09\/cyber-attack.jpg","type":"image\/jpeg"}],"author":"mylene","twitter_card":"summary_large_image","twitter_creator":"@nextlevelpurch","twitter_site":"@nextlevelpurch","twitter_misc":{"Written by":"mylene","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#article","isPartOf":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/"},"author":{"name":"mylene","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/56bfd4401c6931ba9e43c3c5a5a6a452"},"headline":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement","datePublished":"2024-09-12T02:30:35+00:00","dateModified":"2025-06-24T09:33:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/"},"wordCount":563,"publisher":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#organization"},"keywords":["AI in supply chain","blockchain security","cyber defense","cyber security","cyber security providers","cyber threats","emerging trends","incident response","logistics","logistics professionals","malware","NotPetya","procurement","procurement professionals","procurement security","Procurement Strategy","procurement training","ransomware","risk management","ROI in cyber security","Supplier management","supplier risk","supplier security","supply chain attacks","supply chain best practices","supply chain case studies","supply chain disruption","supply chain integrity","supply chain management","supply chain resilience","supply chain security","supply chain vulnerabilities","supply disruption management","supply risk","sustainability management","technology in supply chain","third-party risk","threat detection"],"articleSection":["Cyber Security in Supply Chain","Risk Management","Supply Chain","Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/","url":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/","name":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement - Next Level Purchasing Association (NLPA)","isPartOf":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#website"},"datePublished":"2024-09-12T02:30:35+00:00","dateModified":"2025-06-24T09:33:17+00:00","description":"Learn how to protect your business from supply chain attacks with expert tips tailored for procurement and logistics professionals.","breadcrumb":{"@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.certitrek.com\/nlpa\/blog\/navigating-supply-chain-attacks-a-cyber-security-guide-for-procurement\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.certitrek.com\/nlpa\/"},{"@type":"ListItem","position":2,"name":"Navigating Supply Chain Attacks: A Cyber Security Guide for Procurement"}]},{"@type":"WebSite","@id":"https:\/\/www.certitrek.com\/nlpa\/#website","url":"https:\/\/www.certitrek.com\/nlpa\/","name":"Next Level Purchasing Association (NLPA)","description":"The Next Level Purchasing Association","publisher":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.certitrek.com\/nlpa\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.certitrek.com\/nlpa\/#organization","name":"Next Level Purchasing Association (NLPA)","url":"https:\/\/www.certitrek.com\/nlpa\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/","url":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png","contentUrl":"https:\/\/www.certitrek.com\/nlpa\/wp-content\/uploads\/sites\/5\/2020\/08\/NLPA-logo-small-1.png","width":149,"height":50,"caption":"Next Level Purchasing Association (NLPA)"},"image":{"@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/next-level-purchasing-association\/","https:\/\/www.youtube.com\/channel\/UCrNZYjcLcaNA4xMKQHEGamw","https:\/\/www.facebook.com\/NextLevelPurchasing\/","https:\/\/twitter.com\/nextlevelpurch"]},{"@type":"Person","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/56bfd4401c6931ba9e43c3c5a5a6a452","name":"mylene","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.certitrek.com\/nlpa\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/be98bfe3e5dfd79e2436e864fd3fd8b6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/be98bfe3e5dfd79e2436e864fd3fd8b6?s=96&d=mm&r=g","caption":"mylene"}}]}},"acf":[],"_links":{"self":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/19618"}],"collection":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/comments?post=19618"}],"version-history":[{"count":3,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/19618\/revisions"}],"predecessor-version":[{"id":20133,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/posts\/19618\/revisions\/20133"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/media\/19619"}],"wp:attachment":[{"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/media?parent=19618"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/categories?post=19618"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.certitrek.com\/nlpa\/wp-json\/wp\/v2\/tags?post=19618"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}