{"id":10855,"date":"2020-05-06T07:05:51","date_gmt":"2020-05-06T12:05:51","guid":{"rendered":"http:\/\/45.33.92.219\/?p=10855"},"modified":"2020-05-06T07:05:51","modified_gmt":"2020-05-06T12:05:51","slug":"protecting-drinking-and-waste-water-utilities-from-cyber-threats","status":"publish","type":"post","link":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/","title":{"rendered":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats"},"content":{"rendered":"<h2>Cyber Security: Protecting Drinking and Waste-Water Utilities from Cyber Threats<\/h2>\n<p>Implementing cybersecurity best practices is critical for water and waste-water utilities. Cyber-attacks are a growing threat to critical infrastructure sectors including water and waste-water systems. Many critical infrastructure facilities have experienced cybersecurity incidents that led to the disruption of a business process or critical operation.<\/p>\n<p>The Israeli government has issued an alert to organizations in the water sector following a series of cyberattacks aimed at water facilities. According to an alert published by Israel\u2019s National Cyber Directorate, the attacks targeted supervisory control and data acquisition (SCADA) systems at waste-water treatment plants, pumping stations and sewage facilities.<\/p>\n<p>Organizations in the water and energy sectors have been advised to immediately change the passwords of internet-accessible control systems, reduce internet exposure and ensure that all control system software is up to date. According to Israeli media reports, the attackers\u00a0targeted facilities across the country\u00a0on Friday\u00a0and\u00a0Saturday. Representatives of Israel\u2019s Water Authority claims that\u00a0the attacks\u00a0have\u00a0not caused\u00a0any operational damage. Organizations have been advised to immediately report incidents that result in disruptions.<\/p>\n<h4>Cyber Threats to Water and Waste-Water Systems:<\/h4>\n<p>Cyber-attacks on water or waste-water utility business enterprise or process control systems can cause significant harm, such as:<\/p>\n<ol>\n<li>Upset treatment and conveyance processes by opening and closing valves, overriding alarms,\u00a0disabling pumps or other equipment.<\/li>\n<li>Deface the utility\u2019s website or compromise the email system.<\/li>\n<li>Steal customers\u2019 personal data or credit card information from the utility\u2019s billing system.<\/li>\n<li>Install malicious programs like ransomware which can disable business enterprise or process control\u00a0operations.<\/li>\n<\/ol>\n<p>These attacks can compromise the ability of water and waste-water utilities to provide clean and safe water to customers, erode customer confidence and result in financial and legal liabilities.<\/p>\n<h4>Benefits of a Cybersecurity Program:<\/h4>\n<p>The good news is that cybersecurity best practices can be very effective in eliminating the vulnerabilities that cyber-attacks exploit. Implementing a basic cybersecurity program can:<\/p>\n<ol>\n<li>Ensure the integrity of process control systems.<\/li>\n<li>Protect sensitive utility and customer information.<\/li>\n<li>Reduce legal liabilities if customer or employee personal information is stolen.<\/li>\n<li>Maintain customer confidence.<\/li>\n<\/ol>\n<h4>Challenges for Utilities in Starting a Cybersecurity Program:<\/h4>\n<p>Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cybersecurity program. Utility personnel may believe that cyber-attacks do not present a risk to their systems or feel that they lack the technical capability to improve their cybersecurity.<\/p>\n<p>Be assured, however, that basic cybersecurity best practices can be carried out by utility personnel without specialized training and user-friendly resources are available to help. You just have to know how to start and where to look\u00a0at!<\/p>\n<h4>KENTIX Solutions for Waste-Water\u00a0Utilities:<\/h4>\n<p>The\u00a0KENTIX\u00a0Multi\u00a0Sensor\u00ae technology monitors all important physical hazards in space, rack and infrastructure in your container data center with only a few devices. The various status\u00a0and\u00a0alarm values are provided via SNMP\u00a0that\u00a0can be easily integrated into the respective management tool via the SNMP Management\u00a0Information-Base (MIB).\u00a0KENTIX\u00a0devices support all major monitoring, SCADA and DCIM (Data Center Infrastructure Management) solutions.\u00a0KENTIX\u00a0can also be used to concentrate and monitor information from external systems (climate, UPS, generators, electrical systems etc.).<\/p>\n<p>The 24\/7 monitoring and the complete monitoring of a branched and mostly global infrastructure is an important part for companies to ensure their operations.<\/p>\n<p>The\u00a0KENTIX\u00a0Multi\u00a0Sensor\u00ae\u00a0technology monitors all important parameters such as temperature, humidity, dew point, fire, voltage, movement and much more with a single system. KENTIX\u00a0is therefore part of the basic equipment of every IT infrastructure no matter whether it is a small data center, repeater station or distributed remote containers.<\/p>\n<p>The\u202fClarity\u202fconcept\u202fstarted\u202fin 1977 as a\u202fphysical security company and has evolved over time. Our expertise\u202fstarted\u202fmaturing\u202fwith alarm systems, telephone key systems, computers,\u202fand\u202fassociated products.\u202fToday we are part of the cutting edge with major US and international clients.\u202fWe\u202fare proud,\u202fof our growth and\u202fformation\u202finto a\u202fgroup of\u202fhighly focused and specialized ITSP, SIP Provider,\u202fIPTV, Network and Cyber Security specialist\u2019s. Clarity has been\u202fproviding\u202fpeace of mind for our clients from the edge\u202fto\u202fthe world and back for\u202fmany years.<\/p>\n<p style=\"text-align: center;\"><span data-ccp-props=\"{&quot;134233117&quot;:true,&quot;134233118&quot;:true,&quot;201341983&quot;:0,&quot;335551550&quot;:2,&quot;335551620&quot;:2,&quot;335559740&quot;:240}\"><img decoding=\"async\" class=\"alignnone size-full wp-image-9326\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" alt=\"\" width=\"300\" height=\"116\" \/><img decoding=\"async\" class=\"alignnone wp-image-9425\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/PNG-275x300.png\" alt=\"\" width=\"135\" height=\"147\" \/>\u00a0<\/span><\/p>\n<p>Call Clarity at 800-354-4160 today or email us at\u202f<strong><u><a href=\"mailto:info@clarityscg.com\">info@clarityscg.com<\/a><\/u><\/strong>\u202f. We are partnered internationally around the globe and we are open seven days a week 8:30 AM to 5:00 PM EST\/EDT.\u202f<strong><u><a href=\"http:\/\/45.33.92.219\/\">http:\/\/45.33.92.219\/<\/a><\/u><\/strong>\u202fand\u202f<strong><u><a href=\"https:\/\/dotmantech.com\/\">https:\/\/dotmantech.com<\/a><\/u><\/strong>\u202f.\u00a0To\u00a0subscribe\u00a0to\u00a0our weekly updates and newsletters please\u00a0sign up at\u00a0<u><a href=\"http:\/\/45.33.92.219\/subscribe\">http:\/\/45.33.92.219\/subscribe<\/a><\/u>\u00a0.<\/p>\n<p>[mc4wp_form id=&#8221;314&#8243;]<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber Security: Protecting Drinking and Waste-Water Utilities from Cyber Threats Implementing cybersecurity best practices is critical for water and waste-water utilities. Cyber-attacks are a growing threat to critical infrastructure sectors including water and waste-water systems. Many critical infrastructure facilities have experienced cybersecurity incidents that led to the disruption of a business process or critical operation. [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[94,96,97,98,99,100,101],"class_list":["post-10855","post","type-post","status-publish","format-standard","hentry","category-news","tag-ceh","tag-cybersecurity","tag-firewall","tag-hardware-firewall","tag-intrusion-detection","tag-penetration-testing","tag-vulnerability-detection"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -<\/title>\n<meta name=\"description\" content=\"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -\" \/>\n<meta property=\"og:description\" content=\"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-06T12:05:51+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" \/>\n<meta name=\"author\" content=\"Bruce Kreeger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Kreeger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/\"},\"author\":{\"name\":\"Bruce Kreeger\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"headline\":\"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats\",\"datePublished\":\"2020-05-06T12:05:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/\"},\"wordCount\":772,\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"keywords\":[\"CEH\",\"cybersecurity\",\"Firewall\",\"Hardware Firewall\",\"Intrusion detection\",\"Penetration Testing\",\"Vulnerability detection.\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/\",\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/\",\"name\":\"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"datePublished\":\"2020-05-06T12:05:51+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"description\":\"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#primaryimage\",\"url\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\",\"contentUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2020\\\/03\\\/Clarity_Brand.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2020\\\/05\\\/06\\\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/claritytg.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\",\"url\":\"https:\\\/\\\/claritytg.com\\\/\",\"name\":\"\",\"description\":\"Your Solutions Provider\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/claritytg.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\",\"name\":\"Bruce Kreeger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"caption\":\"Bruce Kreeger\"},\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/author\\\/bruec-kreeger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -","description":"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -","og_description":"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.","og_url":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/","article_published_time":"2020-05-06T12:05:51+00:00","og_image":[{"url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","type":"","width":"","height":""}],"author":"Bruce Kreeger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Kreeger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#article","isPartOf":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/"},"author":{"name":"Bruce Kreeger","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"headline":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats","datePublished":"2020-05-06T12:05:51+00:00","mainEntityOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/"},"wordCount":772,"image":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","keywords":["CEH","cybersecurity","Firewall","Hardware Firewall","Intrusion detection","Penetration Testing","Vulnerability detection."],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/","url":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/","name":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats -","isPartOf":{"@id":"https:\/\/claritytg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#primaryimage"},"image":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","datePublished":"2020-05-06T12:05:51+00:00","author":{"@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"description":"Many water and waste-water utilities particularly small systems\u00a0lack the resources\u00a0that are required\u00a0for information technology (IT) and security specialists to assist them with starting a cyber security program.","breadcrumb":{"@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#primaryimage","url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg","contentUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/claritytg.com\/index.php\/2020\/05\/06\/protecting-drinking-and-waste-water-utilities-from-cyber-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/claritytg.com\/"},{"@type":"ListItem","position":2,"name":"Cyber Security : Protecting Drinking\u00a0and Waste-Water\u00a0Utilities\u00a0from Cyber Threats"}]},{"@type":"WebSite","@id":"https:\/\/claritytg.com\/#website","url":"https:\/\/claritytg.com\/","name":"","description":"Your Solutions Provider","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/claritytg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a","name":"Bruce Kreeger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","caption":"Bruce Kreeger"},"url":"https:\/\/claritytg.com\/index.php\/author\/bruec-kreeger\/"}]}},"_links":{"self":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/10855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/comments?post=10855"}],"version-history":[{"count":0,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/10855\/revisions"}],"wp:attachment":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/media?parent=10855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/categories?post=10855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/tags?post=10855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}