{"id":14025,"date":"2023-06-23T03:06:02","date_gmt":"2023-06-23T03:06:02","guid":{"rendered":"https:\/\/www.adminbyrequest.com\/?p=14025"},"modified":"2026-01-25T07:47:30","modified_gmt":"2026-01-25T07:47:30","slug":"shields-up-cisas-campaign-to-strengthen-cybersecurity","status":"publish","type":"post","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign","title":{"rendered":"CISA&#8217;s Cybersecurity Strengthening Campaign"},"content":{"rendered":"\n<p>At&nbsp;Admin By Request, we are constantly striving to highlight the dangers of unprotected endpoints and inadequate malware safeguards. As a provider of privileged access management software, we have written a number of informative and how-to articles on staying safe online, including:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><a href=\"\/en\/blogs\/pack-the-essentials-the-minimum-cyber-security-requirements\" target=\"_blank\" rel=\"noopener\" title=\"\">The Minimum Cyber Security Requirements<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/blogs\/how-much-could-you-lose-over-a-data-breach\" target=\"_blank\" rel=\"noopener\" title=\"\">How Much Could You Lose Over a Data Breach?<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/blogs\/deploying-hi-rise-security-compliance-to-the-home\" target=\"_blank\" rel=\"noopener\" title=\"\">Deploying Hi-Rise Security Compliance to the Home<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/blogs\/easy-peasy-lemon-squeezy-privileged-access-management-made-simple\" target=\"_blank\" rel=\"noopener\" title=\"\">Privileged Access Management Made Simple<\/a><\/li>\n\n\n\n<li><a href=\"\/en\/blogs\/combating-common-ransomware-tactics\" target=\"_blank\" rel=\"noopener\" title=\"\">Combating Common Ransomware Tactics<\/a><\/li>\n<\/ul>\n\n\n\n<p>It&#8217;s not just us &#8211; governments and security organizations also try to ensure their populations and customers stay educated and vigilant when it comes to cybersecurity.<\/p>\n\n\n\n<p>In this blog, we want to highlight one such initiative: the Cybersecurity &amp;&nbsp;Infrastructure Security Agency (CISA&#8217;s) Cybersecurity Strengthening Campaign, <strong>Shields Up<\/strong>.<\/p>\n\n\n\n<p>The following content is sourced from the CISA website&nbsp;<a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/www.cisa.gov\/shields-up<\/a>.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><strong>Overview<\/strong><\/h2>\n\n\n\n<p>As the USA&#8217;s cyber defense agency, CISA stands ready to help organizations prepare for, respond to, and mitigate the impact of cyber attacks.&nbsp;<a href=\"https:\/\/www.cisa.gov\/shields-up\" target=\"_blank\" rel=\"noreferrer noopener\">CISA\u2019s Shields Up campaign web page<\/a>&nbsp;provides recommendations, products, and resources to increase organizational vigilance and keep stakeholders informed about cybersecurity threats and destructive exploits against critical infrastructure.<\/p>\n\n\n\n<p>Every organization\u2014large and small\u2014should adopt a heightened posture when it comes to cybersecurity and protect their most critical assets against disruptive cyber incidents. CISA also encourages its stakeholders to voluntarily share information about cyber-related events that could help mitigate current or emerging cybersecurity threats to critical infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Shields Up: Guidance for Families<\/h2>\n\n\n\n<p>Every individual can take simple steps to improve their cyber hygiene and protect themselves online. In fact, there are 4 things you can do to keep yourself cyber safe. CISA urges everyone to practice the following:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Implement multi-factor authentication on your accounts<\/strong><\/h4>\n\n\n\n<p>A password isn\u2019t enough to keep you safe online. By implementing a second layer of identification, like a confirmation text message or email, a code from an authentication app, a fingerprint or Face ID, or best yet, a&nbsp;<a href=\"https:\/\/fidoalliance.org\/what-is-fido\/\" target=\"_blank\" rel=\"noreferrer noopener\">FIDO<\/a>&nbsp;key, you\u2019re giving your bank, email provider, or any other site you\u2019re logging into the confidence that it really is you. Multi-factor authentication can make you significantly less likely to get hacked.\u202fSo enable multi-factor authentication on your email, social media, online shopping, financial services accounts. And don\u2019t forget your gaming and streaming entertainment services!<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"162\" src=\"\/wp-content\/uploads\/2023\/06\/MFA-1024x162.png\" alt=\"\" class=\"wp-image-14036\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MFA-1024x162.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MFA-300x47.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MFA-768x121.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MFA.png 1145w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Update your software<\/strong><\/h4>\n\n\n\n<p>In fact, turn on automatic updates.\u202f\u202f Bad actors will exploit flaws in the system. Update the operating system on your mobile phones, tablets, and laptops. And update your applications \u2013 especially the web browsers \u2013 on all your devices too. Leverage automatic updates for all devices, applications, and operating systems.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"\/wp-content\/uploads\/2023\/06\/UpdateSoftware-1024x163.png\" alt=\"\" class=\"wp-image-14038\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UpdateSoftware-1024x163.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UpdateSoftware-300x48.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UpdateSoftware-768x122.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UpdateSoftware.png 1145w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Think before you click<\/strong><\/h4>\n\n\n\n<p>More than 90% of successful cyber-attacks start with a phishing email.\u202f\u202fA phishing scheme is when a link or webpage looks legitimate, but it\u2019s a trick designed by bad actors to have you reveal your passwords, social security number, credit card numbers, or other sensitive information. Once they have that information, they can use it on legitimate sites. And they may try to get you to run malicious software, also known as malware. If it\u2019s a link you don\u2019t recognize, trust your instincts, and think before you click.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"164\" src=\"\/wp-content\/uploads\/2023\/06\/ThinkBeforeYou-1024x164.png\" alt=\"\" class=\"wp-image-14039\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ThinkBeforeYou-1024x164.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ThinkBeforeYou-300x48.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ThinkBeforeYou-768x123.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ThinkBeforeYou.png 1121w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Use strong passwords, and ideally a password manager to generate and store unique passwords<\/strong><\/h4>\n\n\n\n<p>Our world is increasingly digital and increasingly interconnected. So, while we must protect ourselves, it\u2019s going to take all of us to really protect the systems we all rely on.<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"163\" src=\"\/wp-content\/uploads\/2023\/06\/UseStrongPasswords-1024x163.png\" alt=\"\" class=\"wp-image-14041\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UseStrongPasswords-1024x163.png 1024w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UseStrongPasswords-300x48.png 300w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UseStrongPasswords-768x123.png 768w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/UseStrongPasswords.png 1115w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Shields Up: Guidance for Organizations<\/h2>\n\n\n\n<p>CISA recommends all organizations\u2014regardless of size\u2014adopt a heightened posture when it comes to cybersecurity and protecting their most critical assets. Recognizing that many organizations find it challenging to identify resources for urgent security improvements, we\u2019ve compiled free cybersecurity services and tools from government partners, and industry to assist. Recommended actions include:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Reduce the likelihood of a damaging cyber intrusion<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Validate that all remote access to the organization\u2019s network and privileged or administrative access requires multi-factor authentication.<\/li>\n\n\n\n<li>Ensure that software is up to date, prioritizing updates that address known exploited vulnerabilities identified by CISA.<\/li>\n\n\n\n<li>Confirm that the organization\u2019s IT personnel have disabled all ports and protocols that are not essential for business purposes.<\/li>\n\n\n\n<li>If the organization is using cloud services, ensure that IT personnel have reviewed and implemented strong controls outlined in CISA&#8217;s guidance.<\/li>\n\n\n\n<li>Sign up for CISA&#8217;s free cyber hygiene services, including vulnerability scanning, to help reduce exposure to threats.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"259\" src=\"\/wp-content\/uploads\/2023\/06\/ReduceLikelihood.png\" alt=\"Cybersecurity Strengthening Campaign, Admin BY Request.\" class=\"wp-image-14042\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ReduceLikelihood.png 498w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/ReduceLikelihood-300x156.png 300w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Take steps to quickly detect a potential intrusion<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Ensure that cybersecurity\/IT personnel are focused on identifying and quickly assessing any unexpected or unusual network behavior. Enable logging in order to better investigate issues or events.<\/li>\n\n\n\n<li>Confirm that the organization&#8217;s entire network is protected by antivirus\/antimalware software and that signatures in these tools are updated.<\/li>\n\n\n\n<li>If working with Ukrainian organizations, take extra care to monitor, inspect, and isolate traffic from those organizations; closely review access controls for that traffic.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"203\" src=\"\/wp-content\/uploads\/2023\/06\/TakeStepsTo.png\" alt=\"\" class=\"wp-image-14044\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/TakeStepsTo.png 498w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/TakeStepsTo-300x122.png 300w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Ensure that the organization is prepared to respond if an intrusion occurs<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Designate a crisis-response team with main points of contact for a suspected cybersecurity incident and roles\/responsibilities within the organization, including technology, communications, legal and business continuity.<\/li>\n\n\n\n<li>Assure availability of key personnel; identify means to provide surge support for responding to an incident.<\/li>\n\n\n\n<li>Conduct a tabletop exercise to ensure that all participants understand their roles during an incident.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"302\" src=\"\/wp-content\/uploads\/2023\/06\/EnsureThatTheOrg.png\" alt=\"\" class=\"wp-image-14045\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/EnsureThatTheOrg.png 498w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/EnsureThatTheOrg-300x182.png 300w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Maximize the organization&#8217;s resilience to a destructive cyber incident<\/strong><\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Test backup procedures to ensure that critical data can be rapidly restored if the organization is impacted by ransomware or a destructive cyberattack; ensure that backups are isolated from network connections.<\/li>\n\n\n\n<li>If using industrial control systems or operational technology, conduct a test of manual controls to ensure that critical functions remain operable if the organization\u2019s network is unavailable or untrusted.<\/li>\n<\/ul>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"498\" height=\"124\" src=\"\/wp-content\/uploads\/2023\/06\/MaximizeTheOrgs.png\" alt=\"\" class=\"wp-image-14047\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MaximizeTheOrgs.png 498w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/MaximizeTheOrgs-300x75.png 300w\" sizes=\"auto, (max-width: 498px) 100vw, 498px\" \/><\/figure>\n\n\n\n<p>By implementing the steps above, all organizations can make near-term progress toward improving cybersecurity and resilience. In addition, while recent cyber incidents have not been attributed to specific actors, CISA urges cybersecurity\/IT personnel at every organization to review Understanding and Mitigating Russian State-Sponsored Cyber Threats to U.S. Critical Infrastructure. CISA also recommends organizations visit StopRansomware.gov, a centralized, whole-of-government webpage providing ransomware resources and alerts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Shields Up: Guidance for Corporate Leaders and CEOs<\/h2>\n\n\n\n<p>Corporate leaders have an important role to play in ensuring that their organization adopts a heightened security posture. CISA urges all senior leaders, including CEOs, to take the following steps:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Empower Chief Information Security Officers (CISO)<\/strong><\/h4>\n\n\n\n<p>In nearly every organization, security improvements are weighed against cost and operational risks to the business. In this heightened threat environment, senior management should empower CISOs by including them in the decision-making process for risk to the company, and ensure that the entire organization understands that security investments are a top priority in the immediate term.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Lower Reporting Thresholds<\/strong><\/h4>\n\n\n\n<p>Every organization should have documented thresholds for reporting potential cyber incidents to senior management and to the U.S. government. In this heightened threat environment, these thresholds should be significantly lower than normal. Senior management should establish an expectation that any indications of malicious cyber activity, even if blocked by security controls, should be reported to report@cisa.gov. Lowering thresholds will ensure we are able to immediately identify an issue and help protect against further attack or victims.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Participate in a Test of Response Plans<\/strong><\/h4>\n\n\n\n<p>Cyber incident response plans should include not only your security and IT teams, but also senior business leadership and Board members. If you\u2019ve not already done, senior management should participate in a tabletop exercise to ensure familiarity with how your organization will manage a major cyber incident, to not only your company but also companies within your supply chain.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Focus on Continuity<\/strong><\/h4>\n\n\n\n<p>Recognizing finite resources, investments in security and resilience should be focused on those systems supporting critical business functions. Senior management should ensure that such systems have been identified and that continuity tests have been conducted to ensure that critical business functions can remain available subsequent to a cyber intrusion.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>Plan for the Worst<\/strong><\/h4>\n\n\n\n<p>While the U.S. government does not have credible information regarding specific threats to the U.S. homeland, organizations should plan for a worst-case scenario. Senior management should ensure that exigent measures can be taken to protect your organization\u2019s most critical assets in case of an intrusion, including disconnecting high-impact parts of the network if necessary.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"476\" height=\"587\" src=\"\/wp-content\/uploads\/2023\/06\/EmpowerCSO.png\" alt=\"\" class=\"wp-image-14048\" srcset=\"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/EmpowerCSO.png 476w, https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/EmpowerCSO-243x300.png 243w\" sizes=\"auto, (max-width: 476px) 100vw, 476px\" \/><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">At&nbsp;Admin By Request,<\/h2>\n\n\n\n<p>We fully endorse the practices outlined by CISA. Our security analysts continually monitor recognized security websites and publications and we frequently re-post and provide commentary, drawing on our own knowledge and experience.<\/p>\n\n\n\n<p>As well as knowing what steps to take, there are tools you can use to help keep yourself safe. One of these is&nbsp;<a href=\"\/en\" target=\"_blank\" rel=\"noopener\" title=\"\">Admin By Request<\/a> Privileged Access Management (PAM) software, designed to protect computer endpoints by restricting their ability to run programs and applications with elevated privileges.<\/p>\n\n\n\n<p>Not only does&nbsp;Admin By Request&nbsp;allow you to protect your endpoints, it also provides inventory, logging, reporting, alerting and other management capability, significantly reducing your work (as IT administrators).<\/p>\n\n\n\n<p>Did you know Admin By Request is free? Get it&nbsp;<a href=\"\/en\/freeplandownload\" target=\"_blank\" rel=\"noopener\" title=\"Shields Up! CISA\u2019s Campaign to Strengthen Cybersecurity.\">here<\/a>&nbsp;for up to 25 endpoints.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every organization &#8211; large and small &#8211; should adopt a heightened posture when it comes to cybersecurity and protect their most critical assets against disruptive cyber incidents.<\/p>\n","protected":false},"author":2,"featured_media":14053,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[36],"tags":[286,89,80,83,90,148,91,82,79,85,86],"ppma_author":[10],"class_list":["post-14025","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blogs","tag-cisa","tag-criminal","tag-current-events","tag-cyber-attack","tag-cyber-criminal","tag-cybersecurity","tag-hacker","tag-malware","tag-ransomware","tag-rdp","tag-remote-desktop-protocol","entry","has-media"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"Every organization should get onboard CISA&#039;s cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.\" \/>\n\t<meta name=\"robots\" content=\"max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n\t<meta name=\"author\" content=\"S Dodson\"\/>\n\t<meta name=\"keywords\" content=\"cisa,criminal,current events,cyber attack,cyber criminal,cybersecurity,hacker,malware,ransomware,rdp,remote desktop protocol\" \/>\n\t<link rel=\"canonical\" href=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Admin By Request \u00bb Local Admin Rights, Managed.\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Cybersecurity Strengthening Campaign \u00bb Admin By Request\" \/>\n\t\t<meta property=\"og:description\" content=\"Every organization should get onboard CISA&#039;s cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t\t<meta property=\"og:image:height\" content=\"1338\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2023-06-23T03:06:02+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2026-01-25T07:47:30+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/adminbyrequest\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Cybersecurity Strengthening Campaign \u00bb Admin By Request\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Every organization should get onboard CISA&#039;s cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@AdminByRequest\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#blogposting\",\"name\":\"Cybersecurity Strengthening Campaign \\u00bb Admin By Request\",\"headline\":\"CISA&#8217;s Cybersecurity Strengthening Campaign\",\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/LinkedInBanner-01.png\",\"width\":2560,\"height\":1338,\"caption\":\"White CISA logo on a black circuit like background.\"},\"datePublished\":\"2023-06-23T03:06:02+00:00\",\"dateModified\":\"2026-01-25T07:47:30+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage\"},\"articleSection\":\"Blogs, CISA, Criminal, Current Events, Cyber Attack, Cyber Criminal, Cybersecurity, Hacker, Malware, Ransomware, RDP, Remote Desktop Protocol, Steve Dodson\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"position\":2,\"name\":\"Blogs\",\"item\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#listItem\",\"name\":\"CISA&#8217;s Cybersecurity Strengthening Campaign\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#listItem\",\"position\":3,\"name\":\"CISA&#8217;s Cybersecurity Strengthening Campaign\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/category\\\/blogs#listItem\",\"name\":\"Blogs\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\",\"name\":\"Admin By Request\",\"description\":\"Local Admin Rights, Managed.\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"telephone\":\"+12622994600\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"\\\/wp-content\\\/uploads\\\/2023\\\/05\\\/Circle-Tick-24.svg\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/adminbyrequest\",\"https:\\\/\\\/twitter.com\\\/AdminByRequest\",\"https:\\\/\\\/www.instagram.com\\\/AdminByRequest\\\/\",\"https:\\\/\\\/www.tiktok.com\\\/@adminbyrequest\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCwq1wlbT9m_z3YH-EPaZqKw\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/adminbyrequest\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin\",\"name\":\"S Dodson\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign\",\"name\":\"Cybersecurity Strengthening Campaign \\u00bb Admin By Request\",\"description\":\"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/author\\\/sophie-admin#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/wp-content\\\/uploads\\\/2023\\\/06\\\/LinkedInBanner-01.png\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign\\\/#mainImage\",\"width\":2560,\"height\":1338,\"caption\":\"White CISA logo on a black circuit like background.\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/blogs\\\/shields-up-cisas-cybersecurity-strengthening-campaign#mainImage\"},\"datePublished\":\"2023-06-23T03:06:02+00:00\",\"dateModified\":\"2026-01-25T07:47:30+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/\",\"name\":\"Admin By Request\",\"alternateName\":\"ABR\",\"description\":\"Local Admin Rights, Managed.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.adminbyrequest.com\\\/en\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<script type=\"text\/javascript\">\n\t\t\t(function(c,l,a,r,i,t,y){\n\t\t\tc[a]=c[a]||function(){(c[a].q=c[a].q||[]).push(arguments)};t=l.createElement(r);t.async=1;\n\t\t\tt.src=\"https:\/\/www.clarity.ms\/tag\/\"+i+\"?ref=aioseo\";y=l.getElementsByTagName(r)[0];y.parentNode.insertBefore(t,y);\n\t\t})(window, document, \"clarity\", \"script\", \"n4woz8og40\");\n\t\t<\/script>\n\t\t<script>(function(w,d,s,l,i){w[l]=w[l]||[];w[l].push({'gtm.start': new Date().getTime(),event:'gtm.js'});var f=d.getElementsByTagName(s)[0], j=d.createElement(s),dl=l!='dataLayer'?'&l='+l:'';j.async=true;j.src='https:\/\/www.googletagmanager.com\/gtm.js?id='+i+dl;f.parentNode.insertBefore(j,f);})(window,document,'script','dataLayer',\"GTM-PGQ6572W\");<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Cybersecurity Strengthening Campaign \u00bb Admin By Request<\/title>\n\n","aioseo_head_json":{"title":"Cybersecurity Strengthening Campaign \u00bb Admin By Request","description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","canonical_url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign","robots":"max-snippet:-1, max-image-preview:large, max-video-preview:-1","keywords":"cisa,criminal,current events,cyber attack,cyber criminal,cybersecurity,hacker,malware,ransomware,rdp,remote desktop protocol","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#blogposting","name":"Cybersecurity Strengthening Campaign \u00bb Admin By Request","headline":"CISA&#8217;s Cybersecurity Strengthening Campaign","author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png","width":2560,"height":1338,"caption":"White CISA logo on a black circuit like background."},"datePublished":"2023-06-23T03:06:02+00:00","dateModified":"2026-01-25T07:47:30+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage"},"isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage"},"articleSection":"Blogs, CISA, Criminal, Current Events, Cyber Attack, Cyber Criminal, Cybersecurity, Hacker, Malware, Ransomware, RDP, Remote Desktop Protocol, Steve Dodson"},{"@type":"BreadcrumbList","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","position":1,"name":"Home","item":"https:\/\/www.adminbyrequest.com\/en","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","position":2,"name":"Blogs","item":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs","nextItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#listItem","name":"CISA&#8217;s Cybersecurity Strengthening Campaign"},"previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#listItem","position":3,"name":"CISA&#8217;s Cybersecurity Strengthening Campaign","previousItem":{"@type":"ListItem","@id":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs#listItem","name":"Blogs"}}]},{"@type":"Organization","@id":"https:\/\/www.adminbyrequest.com\/en\/#organization","name":"Admin By Request","description":"Local Admin Rights, Managed.","url":"https:\/\/www.adminbyrequest.com\/en\/","telephone":"+12622994600","logo":{"@type":"ImageObject","url":"\/wp-content\/uploads\/2023\/05\/Circle-Tick-24.svg","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\/#organizationLogo"},"image":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/adminbyrequest","https:\/\/twitter.com\/AdminByRequest","https:\/\/www.instagram.com\/AdminByRequest\/","https:\/\/www.tiktok.com\/@adminbyrequest","https:\/\/www.youtube.com\/channel\/UCwq1wlbT9m_z3YH-EPaZqKw","https:\/\/www.linkedin.com\/company\/adminbyrequest\/"]},{"@type":"Person","@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author","url":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin","name":"S Dodson"},{"@type":"WebPage","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#webpage","url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign","name":"Cybersecurity Strengthening Campaign \u00bb Admin By Request","description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#website"},"breadcrumb":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#breadcrumblist"},"author":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"creator":{"@id":"https:\/\/www.adminbyrequest.com\/en\/author\/sophie-admin#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png","@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign\/#mainImage","width":2560,"height":1338,"caption":"White CISA logo on a black circuit like background."},"primaryImageOfPage":{"@id":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign#mainImage"},"datePublished":"2023-06-23T03:06:02+00:00","dateModified":"2026-01-25T07:47:30+00:00"},{"@type":"WebSite","@id":"https:\/\/www.adminbyrequest.com\/en\/#website","url":"https:\/\/www.adminbyrequest.com\/en\/","name":"Admin By Request","alternateName":"ABR","description":"Local Admin Rights, Managed.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.adminbyrequest.com\/en\/#organization"}}]},"og:locale":"en_US","og:site_name":"Admin By Request \u00bb Local Admin Rights, Managed.","og:type":"article","og:title":"Cybersecurity Strengthening Campaign \u00bb Admin By Request","og:description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","og:url":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign","og:image":"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png","og:image:secure_url":"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png","og:image:width":"2560","og:image:height":"1338","article:published_time":"2023-06-23T03:06:02+00:00","article:modified_time":"2026-01-25T07:47:30+00:00","article:publisher":"https:\/\/www.facebook.com\/adminbyrequest","twitter:card":"summary_large_image","twitter:site":"@AdminByRequest","twitter:title":"Cybersecurity Strengthening Campaign \u00bb Admin By Request","twitter:description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","twitter:creator":"@AdminByRequest","twitter:image":"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png"},"aioseo_meta_data":{"post_id":"14025","title":"Cybersecurity Strengthening Campaign #separator_sa #site_title","description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","keywords":[],"keyphrases":{"focus":{"keyphrase":"Cybersecurity Strengthening Campaign","score":80,"analysis":{"keyphraseInTitle":{"score":9,"maxScore":9,"error":0},"keyphraseInDescription":{"score":9,"maxScore":9,"error":0},"keyphraseLength":{"score":9,"maxScore":9,"error":0,"length":3},"keyphraseInURL":{"score":5,"maxScore":5,"error":0},"keyphraseInIntroduction":{"score":3,"maxScore":9,"error":1},"keyphraseInSubHeadings":{"score":3,"maxScore":9,"error":1},"keyphraseInImageAlt":{"score":9,"maxScore":9,"error":0}}},"additional":[]},"primary_term":null,"canonical_url":null,"og_title":"Cybersecurity Strengthening Campaign #separator_sa #site_title","og_description":"Every organization should get onboard CISA's cybersecurity strengthening campaign to protect their most critical assets against disruptive cyber incidents.","og_object_type":"default","og_image_type":"featured","og_image_url":"https:\/\/www.adminbyrequest.com\/wp-content\/uploads\/2023\/06\/LinkedInBanner-01.png","og_image_width":"2560","og_image_height":"1338","og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":true,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2026-01-25 08:06:31","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":"{\"title\":{\"suggestions\":[],\"usage\":0},\"description\":{\"suggestions\":[],\"usage\":0}}","ai":null,"created":"2023-06-23 03:03:16","updated":"2026-01-25 08:06:31"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.adminbyrequest.com\/en\/category\/blogs\" title=\"Blogs\">Blogs<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tCISA\u2019s Cybersecurity Strengthening Campaign\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.adminbyrequest.com\/en"},{"label":"Blogs","link":"https:\/\/www.adminbyrequest.com\/en\/category\/blogs"},{"label":"CISA&#8217;s Cybersecurity Strengthening Campaign","link":"https:\/\/www.adminbyrequest.com\/en\/blogs\/shields-up-cisas-cybersecurity-strengthening-campaign"}],"authors":[{"term_id":10,"user_id":0,"is_guest":1,"slug":"steve-dodson","display_name":"Steve Dodson","avatar_url":{"url":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png","url2x":"https:\/\/www.adminbyrequest.com\/en\/wp-content\/uploads\/2022\/09\/SteveHeadshotSquareABR.png"},"author_category":"","user_url":"","last_name":"Dodson","first_name":"Steve","job_title":"","description":"Steve provides research, analysis, insight and commentary on topical issues and events. He lives in New Zealand and has been working at FastTrack Software for 12 years as a cyber security analyst and technical writer."}],"_links":{"self":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14025","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/comments?post=14025"}],"version-history":[{"count":2,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14025\/revisions"}],"predecessor-version":[{"id":15657,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/posts\/14025\/revisions\/15657"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media\/14053"}],"wp:attachment":[{"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/media?parent=14025"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/categories?post=14025"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/tags?post=14025"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.adminbyrequest.com\/en\/wp-json\/wp\/v2\/ppma_author?post=14025"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}