{"id":13509,"date":"2021-08-03T15:02:02","date_gmt":"2021-08-03T20:02:02","guid":{"rendered":"http:\/\/45.33.92.219\/?p=13509"},"modified":"2021-08-03T15:02:02","modified_gmt":"2021-08-03T20:02:02","slug":"how-to-tackle-critical-infrastructure-security-complexities","status":"publish","type":"post","link":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/","title":{"rendered":"How To Tackle Critical Infrastructure Security Complexities"},"content":{"rendered":"<h5 style=\"text-align: center;\">How To Tackle Critical Infrastructure Security Complexities<\/h5>\n<p><strong>By: Bruce G. kreeger<\/strong><\/p>\n<div align=\"justify\">\n<p><strong>Three of the most recent major critical infrastructure attacks in 2021 have taken advantage of gaping security vulnerabilities in the nation\u2019s crucial water, gas and food supplies.<\/strong><\/p>\n<p><strong><a href=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"size-full wp-image-13510 aligncenter\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg\" alt=\"\" width=\"990\" height=\"355\" \/><\/a>In early February,\u00a0<a href=\"https:\/\/www.nytimes.com\/2021\/02\/08\/us\/oldsmar-florida-water-supply-hack.html\" target=\"_blank\" rel=\"nofollow noopener\">a Florida water treatment plant in Oldsmar<\/a>, a small city just west of Tampa, had its computer system breached. The result was levels of sodium hydroxide were raised to more than 1,000 times the acceptable levels. This chemical, the same ingredient used in drain clear, skyrocketed the toxicity of the city water could have potentially sickened thousands of residents if the attack had not been detected.\u00a0<\/strong><\/p>\n<p><strong>Then on May 10, the most significant attack against U.S. critical infrastructure occurred when\u00a0<a href=\"https:\/\/www.securityinfowatch.com\/critical-infrastructure\/article\/21222177\/colonial-pipeline-cyberattack-is-a-chilling-reminder-of-us-infrastructure-vulnerability\" target=\"_blank\" rel=\"nofollow noopener\">Colonial Pipeline<\/a>, the nation\u2019s largest fuel pipeline, was forced to shut down operations when faced with a ransomware attack. For almost two weeks, gas stations up and down the U.S. East Coast and as far west as Texas were either out of gas entirely or rationing what they had. More than a month following the attack, gas prices remain high as a result.<\/strong><\/p>\n<p><strong>And in June,<a href=\"https:\/\/www.nytimes.com\/2021\/06\/01\/business\/meat-plant-cyberattack-jbs.html\" target=\"_blank\" rel=\"nofollow noopener\">\u00a0JBS<\/a>, the largest meat processer in the U.S., supplying up to a fifth of the nation\u2019s meat supply, was forced to cease operations due to a cyberattack. JBS was just one of the latest major food and beverage companies that have been victimized over the last decade.<\/strong><\/p>\n<p><strong>With the\u00a0<a href=\"https:\/\/www.businesswire.com\/news\/home\/20180607006046\/en\/Global-118-Bn-Critical-Infrastructure-Protection-Market-Research-Report-2018---Forecast-to-2028---ResearchAndMarkets.com\" target=\"_blank\" rel=\"nofollow noopener\">Global Critical Infrastructure Protection (CIP) market<\/a>\u00a0expected to grow from an estimated $92 billion in 2018 to more than $118 billion by 2028, security professionals realize the imminent threat this sector is under and have committed to tightening security in both cyber and physical security environments. The report states that most CIP programs initiated or revised in recent years focus on adopting a risk management approach. This focus has the CIP sector continuously engaged in identifying significant security assets, analyzing risks, and formulating strategies to prioritize mitigating risks best.<\/strong><\/p>\n<p><strong>Perhaps the biggest challenge to protecting the nation\u2019s critical infrastructure is the fact that the private sector owns more than 80%. This creates substantial friction when expensive security and risk mitigation programs are constrained by tight institutional economic realities and a lack of proper oversight.<\/strong><\/p>\n<p><strong>How can the critical infrastructure sector ensure that it can protect itself and the nation from catastrophic physical and cyber chaos? A strong critical infrastructure security and resilience program must be based on collaboration and information sharing. Collaboration can be facilitated by establishing processes necessary for the government(s) and the private sector to communicate freely without releasing proprietary information or providing an unfair advantage. A trusted information-sharing environment will allow stakeholders to share crucial data that can strengthen security and resilience.<\/strong><\/p>\n<p><strong>Advanced technology solutions can facilitate collaborative and resilient security programs when used in tandem within a strong risk and compliance framework. It is this approach that Intelligent Security Systems (ISS) employs to construct comprehensive\u00a0digital video surveillance\u00a0and control systems solutions that are cutting edge and tailored to each project. This is most important for critical infrastructure since it allows for solutions that are open, flexible and scalable and permits centralized command and control of an entire enterprise security network in a single place.<\/strong><\/p>\n<p><strong>The integrated platform that typifies the ISS solutions includes video management (VMS), license plate recognition (ANPR\/LPR), facial recognition, container number recognition, and Under Vehicle Surveillance (UVSS) that can all be deployed in tandem to form a security blanket around critical infrastructure sites. Video surveillance systems, using advanced analytics built on\u00a0<a href=\"https:\/\/www.intel.com\/content\/www\/us\/en\/artificial-intelligence\/overview.html\" target=\"_blank\" rel=\"nofollow noopener\">Intel Artificial Neural Network<\/a>\u00a0technology, can monitor both security and safety issues and alert staff when problems arise. At the industrial level, surveillance can also be used to monitor productivity. ISS can also integrate an array of security solutions from full Building Management Systems and life safety to access control.<\/strong><\/p>\n<p><strong>We are proud to have been providing ISS (https:\/\/issivs.com\/) and Mobotix Security and Surveillance Systems (https:\/\/www.mobotix.com\/) to North America since 2006. As one of the longest serving mobotix Partners in North America and with clients worldwide offering this unparalleled video communications platform and ultimately earning the level of Gold Partner, Clarity Technologies Group, LLC surpasses expectations.<\/strong><\/p>\n<\/div>\n<p style=\"text-align: center;\"><strong><img decoding=\"async\" class=\"alignnone size-full wp-image-9326\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/Clarity_Brand.jpg\" alt=\"\" width=\"300\" height=\"116\" \/><img decoding=\"async\" class=\"alignnone wp-image-9425\" src=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2020\/03\/PNG-275x300.png\" alt=\"\" width=\"125\" height=\"136\" \/>\u00a0<\/strong><\/p>\n<p><strong>Call Clarity at 800-354-4160 today or email us at <a href=\"mailto:info@clarityscg.com\">info@clarityscg.com<\/a>. We are partnered internationally around the globe and we are open seven days a week 8:30 AM to 5:00 PM EST\/EDT. <a href=\"http:\/\/45.33.92.219\">http:\/\/45.33.92.219<\/a> and <a href=\"https:\/\/dotmantech.com\">https:\/\/dotmantech.com<\/a>.<\/strong><\/p>\n<p><strong>\u00a0\u00a0<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How To Tackle Critical Infrastructure Security Complexities By: Bruce G. kreeger Three of the most recent major critical infrastructure attacks in 2021 have taken advantage of gaping security vulnerabilities in the nation\u2019s crucial water, gas and food supplies. In early February,\u00a0a Florida water treatment plant in Oldsmar, a small city just west of Tampa, had [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[9],"tags":[],"class_list":["post-13509","post","type-post","status-publish","format-standard","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How To Tackle Critical Infrastructure Security Complexities -<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Tackle Critical Infrastructure Security Complexities -\" \/>\n<meta property=\"og:description\" content=\"How To Tackle Critical Infrastructure Security Complexities By: Bruce G. kreeger Three of the most recent major critical infrastructure attacks in 2021 have taken advantage of gaping security vulnerabilities in the nation\u2019s crucial water, gas and food supplies. In early February,\u00a0a Florida water treatment plant in Oldsmar, a small city just west of Tampa, had [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-08-03T20:02:02+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg\" \/>\n<meta name=\"author\" content=\"Bruce Kreeger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bruce Kreeger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/\"},\"author\":{\"name\":\"Bruce Kreeger\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"headline\":\"How To Tackle Critical Infrastructure Security Complexities\",\"datePublished\":\"2021-08-03T20:02:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/\"},\"wordCount\":741,\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/232-1.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/\",\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/\",\"name\":\"How To Tackle Critical Infrastructure Security Complexities -\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#primaryimage\"},\"thumbnailUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/232-1.jpg\",\"datePublished\":\"2021-08-03T20:02:02+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#primaryimage\",\"url\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/232-1.jpg\",\"contentUrl\":\"http:\\\/\\\/45.33.92.219\\\/wp-content\\\/uploads\\\/2021\\\/08\\\/232-1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/2021\\\/08\\\/03\\\/how-to-tackle-critical-infrastructure-security-complexities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/claritytg.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Tackle Critical Infrastructure Security Complexities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#website\",\"url\":\"https:\\\/\\\/claritytg.com\\\/\",\"name\":\"\",\"description\":\"Your Solutions Provider\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/claritytg.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/claritytg.com\\\/#\\\/schema\\\/person\\\/86bd75151df1ebd74e9ee49480a8301a\",\"name\":\"Bruce Kreeger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g\",\"caption\":\"Bruce Kreeger\"},\"url\":\"https:\\\/\\\/claritytg.com\\\/index.php\\\/author\\\/bruec-kreeger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Tackle Critical Infrastructure Security Complexities -","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/","og_locale":"en_US","og_type":"article","og_title":"How To Tackle Critical Infrastructure Security Complexities -","og_description":"How To Tackle Critical Infrastructure Security Complexities By: Bruce G. kreeger Three of the most recent major critical infrastructure attacks in 2021 have taken advantage of gaping security vulnerabilities in the nation\u2019s crucial water, gas and food supplies. In early February,\u00a0a Florida water treatment plant in Oldsmar, a small city just west of Tampa, had [&hellip;]","og_url":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/","article_published_time":"2021-08-03T20:02:02+00:00","og_image":[{"url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg","type":"","width":"","height":""}],"author":"Bruce Kreeger","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Bruce Kreeger","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#article","isPartOf":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/"},"author":{"name":"Bruce Kreeger","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"headline":"How To Tackle Critical Infrastructure Security Complexities","datePublished":"2021-08-03T20:02:02+00:00","mainEntityOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/"},"wordCount":741,"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg","articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/","url":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/","name":"How To Tackle Critical Infrastructure Security Complexities -","isPartOf":{"@id":"https:\/\/claritytg.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#primaryimage"},"image":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#primaryimage"},"thumbnailUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg","datePublished":"2021-08-03T20:02:02+00:00","author":{"@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a"},"breadcrumb":{"@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#primaryimage","url":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg","contentUrl":"http:\/\/45.33.92.219\/wp-content\/uploads\/2021\/08\/232-1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/claritytg.com\/index.php\/2021\/08\/03\/how-to-tackle-critical-infrastructure-security-complexities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/claritytg.com\/"},{"@type":"ListItem","position":2,"name":"How To Tackle Critical Infrastructure Security Complexities"}]},{"@type":"WebSite","@id":"https:\/\/claritytg.com\/#website","url":"https:\/\/claritytg.com\/","name":"","description":"Your Solutions Provider","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/claritytg.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/claritytg.com\/#\/schema\/person\/86bd75151df1ebd74e9ee49480a8301a","name":"Bruce Kreeger","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78247c938cf2563ce477bb1b32c8fba8e9ade964d84a001bafb455c6f8b1f589?s=96&d=mm&r=g","caption":"Bruce Kreeger"},"url":"https:\/\/claritytg.com\/index.php\/author\/bruec-kreeger\/"}]}},"_links":{"self":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/13509","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/comments?post=13509"}],"version-history":[{"count":0,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/posts\/13509\/revisions"}],"wp:attachment":[{"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/media?parent=13509"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/categories?post=13509"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/claritytg.com\/index.php\/wp-json\/wp\/v2\/tags?post=13509"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}