{"id":3696,"date":"2025-05-07T11:54:00","date_gmt":"2025-05-07T11:54:00","guid":{"rendered":"https:\/\/digiterrebestg.wpengine.com\/us\/?p=3696"},"modified":"2025-06-25T14:46:32","modified_gmt":"2025-06-25T14:46:32","slug":"legacy-threat-cybersecurity-lessons-from-retail-attacks","status":"publish","type":"post","link":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/","title":{"rendered":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0"},"content":{"rendered":"<section id=\"block_b9800f7a0a0482f4d46914526f3882c5\" class=\"acf-blocks page-header flex flex-wrap items-center justify-center !mt-0 bg-center bg-no-repeat bg-cover py-16 min-h-[30rem] \" style=\"background-image:linear-gradient(0deg, rgba(0, 0, 0, 0.6), rgba(0, 0, 0, 0.6)), url(https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg);\">\n    <div class=\"container mx-auto text-center\">\n        <h1>Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0<\/h1>\n\n        \n            <\/div>\n<\/section>\n\n\n<div class=\"wp-block-columns aligncenter is-section is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\">\n<p>Another week, another cyber security incident. Recent cyber-attacks on major retail brands and their suppliers\u202fhave served as a wake-up call across sectors, particularly for banking and capital markets institutions. These incidents, while outside the financial industry, expose a universal truth: outdated systems, siloed platforms, and reactive security measures are no longer sustainable. For financial services firms handling high volumes of sensitive customer and transactional data, the lessons from retail are both relevant and urgent.&nbsp;<\/p>\n\n\n\n<p><strong>Legacy systems: the silent threat<\/strong>&nbsp;<\/p>\n\n\n\n<p>One of the common threads in recent breaches has been the reliance on legacy technology. In the retail sector, outdated point-of-sale systems, unpatched databases, and loosely integrated platforms created exploitable vulnerabilities. The same challenge exists in banking, where decades-old core systems still underpin critical operations. While functionally stable, these legacy environments are often incompatible with modern security tools, making them soft targets for threat actors.&nbsp;<\/p>\n\n\n\n<p><strong>Data is the crown jewel<\/strong>&nbsp;<\/p>\n\n\n\n<p>Retailers have learned the hard way that customer data is among the most valuable assets\u2014and most attractive to cybercriminals. Banks, asset managers, and trading firms sit on even richer troves of information, including personally identifiable data, transaction histories, and market-sensitive records. Without rigorous data governance, encryption, and role-based access controls, the risk of exposure multiplies.&nbsp;<\/p>\n\n\n\n<p><strong>Security must be embedded, not added later<\/strong>&nbsp;<\/p>\n\n\n\n<p>Post-attack investigations often reveal that security was bolted onto systems as an afterthought rather than built into them from the start. This approach is inadequate in any sector, but especially so in capital markets where uptime, accuracy, and trust are paramount. Financial institutions must integrate DevSecOps principles, enabling continuous assessment and mitigation of risks throughout the software lifecycle.&nbsp;<\/p>\n\n\n\n<p><strong>Response time matters<\/strong>&nbsp;<\/p>\n\n\n\n<p>In several high-profile retail breaches, delayed detection and slow responses exacerbated the damage. Financial systems, given their complexity and transaction volumes, require real-time monitoring, automated threat detection, and agile incident response frameworks. The longer a breach goes undetected, the more costly the fallout\u2014in both financial and reputational terms.&nbsp;<\/p>\n\n\n\n<p><strong>Supply chain risks cannot be ignored<\/strong>&nbsp;<\/p>\n\n\n\n<p>Retail breaches often stem from third-party service providers\u2014payment platforms, logistics vendors, or outsourced IT partners. In banking, the equivalent risk lies in fintech integrations, cloud vendors, and outsourced development. Institutions must perform continuous due diligence on their supply chains, implementing zero-trust principles and contractual obligations around security standards.&nbsp;<\/p>\n\n\n\n<p><strong>Reputation is the real currency<\/strong>&nbsp;<\/p>\n\n\n\n<p>Brand trust is one of the hardest-earned and most easily lost assets. When retailers experience a data breach, customer loyalty can plummet. The stakes are even higher in financial services, where clients entrust firms with their wealth, data, and livelihoods. A single incident can erode years of trust and result in regulatory penalties, lawsuits, and business loss.&nbsp;<\/p>\n\n\n\n<p><strong>The path forward for financial institutions<\/strong>&nbsp;<\/p>\n\n\n\n<p>Financial services organisations must learn from retail\u2019s mistakes by rethinking how they approach resilience and security. That means:&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list custom-bullet\">\n<li>Modernizing legacy systems to reduce attack surfaces.\u00a0<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list custom-bullet\">\n<li>Embedding security into infrastructure and development from the outset.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list custom-bullet\">\n<li>Leveraging AI and machine learning for real-time threat detection.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list custom-bullet\">\n<li>Strengthening third-party risk management protocols.&nbsp;<\/li>\n<\/ul>\n\n\n\n<ul class=\"wp-block-list custom-bullet\">\n<li>Preparing and testing incident response strategies.&nbsp;<\/li>\n<\/ul>\n\n\n\n<p><strong>At Digiterre, we work closely with capital markets clients to build resilient, high-performing systems that are secure by design. From data architecture to application delivery, we prioritize reliability, agility, and security\u2014ensuring our clients can operate with confidence in an increasingly volatile threat landscape.<\/strong>\u00a0<\/p>\n\n\n\n<p><strong>The retail sector&#8217;s pain points offer a valuable blueprint. The question for financial institutions is not whether they can afford to modernize and secure their systems\u2014but whether they can afford not to.<\/strong>\u00a0<\/p>\n\n\n\n<p><strong>If you\u2019re looking for help to modernize your legacy systems, <\/strong><a href=\"https:\/\/www.digiterre.com\/contact-us\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>let\u2019s talk<\/strong><\/a><strong>.<\/strong>\u00a0<\/p>\n<\/div>\n<\/div>\n\n\n\n<section id=\"block_12642d939ca0c0f02827aba1d9f1840e\" class=\"acf-blocks post-meta container mx-auto \">\n    <div class=\"max-w-fit mx-auto p-4 relative after:content-[''] after:absolute after:top-0 after:left-0 after:w-full after:h-[2px] lg:after:w-[2px] lg:after:h-[100%] after:bg-dark after:rounded-full\">\n        <h3 class=\"text-4xl font-semibold text-center md:text-left\">About the Author<\/h3>\n        <div class=\"md:flex items-start lg:items-center md:justify-start flex-wrap\">\n                  \n            <img loading=\"lazy\" decoding=\"async\" width=\"106\" height=\"150\" src=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2024\/12\/Juniper-Place-case-study-pdf-106x150.jpg\" class=\"rounded-digiterre md:w-24 md:h-24 lg:w-36 lg:h-36 md:mr-4 shadow-digiterre shadow-dark\/[.15] mb-4 md:mb-0 mx-auto md:mx-0\" alt=\"\" \/>                        <div>\n                <h4 class=\"text-2xl mb-2 font-semibold text-center md:text-left\">Digiterre<\/h4>\n\n                \n                                \n            <\/div>            \n        <\/div>\n        <div class=\"flex flex-wrap items-center justify-center md:justify-start font-visby text-sm w-full md:space-x-4 mt-6\">\n            <span class=\"block md:inline-block rounded-full px-5 py-3 bg-primary-lightest text-primary\">Date: <strong>07\/05\/25<\/strong><\/span>\n            <span class=\"block md:inline-block rounded-full px-5 py-3 bg-primary-lightest text-primary mt-4 md:mt-0\">Category: <strong>Tech Insights<\/strong><\/span>\n        <\/div>\n    <\/div>\n<\/section>\n\n\n<section id=\"block_afa7a7ef6b32f18a7affb9364693e0f5\" class=\"acf-blocks insights-posts-grid container mx-auto flex flex-wrap items-start \">\n    <div class=\"grid grid-cols-1 md:grid-cols-2 gap-6 lg:w-3\/4 pr-6\">\n                        <article class=\"flex items-start\">\n                    <a href=\"https:\/\/www.digiterre.com\/us\/2025\/06\/03\/digiterre-opens-in-dusseldorf-strengthening-our-presence-in-germanys-energy-market\/\" class=\"contents\" title=\"Digiterre Opens in D\u00fcsseldorf: Strengthening Our Presence in Germany\u2019s Energy Market\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-150x150.jpg\" class=\"rounded-digiterre w-24 h-24 lg:w-36 lg:h-36 md:mr-4 shadow-digiterre shadow-dark\/[.15] hover:scale-105 transition-all duration-300 wp-post-image\" alt=\"\" srcset=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-150x150.jpg 150w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-300x300.jpg 300w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-1024x1024.jpg 1024w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-768x768.jpg 768w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-1536x1536.jpg 1536w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Website-article-posts-for-new-website-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>\n\n                    <div class=\"flex flex-wrap flex-col justify-between h-full pl-4 md:pl-0\">\n                        <a href=\"https:\/\/www.digiterre.com\/us\/2025\/06\/03\/digiterre-opens-in-dusseldorf-strengthening-our-presence-in-germanys-energy-market\/\">\n                            <h4 class=\"text-base lg:text-xl mb-4 font-semibold md:mb-2 hover:text-primary-dark transition-all duration-300\">Digiterre Opens in D\u00fcsseldorf: Strengthening Our Presence in Germany\u2019s Energy Market<\/h4>\n                        <\/a>\n                        <div class=\"font-visby text-sm\">\n                            <p class=\"mb-1 text-sm md:text-base\">Date: <strong>03\/06\/25<\/strong><\/p>\n                            <p class=\"mb-0 text-sm md:text-base\">By: <strong>Laurence Pisani<\/strong><\/p>\n                        <\/div>\n                    <\/div>\n                <\/article>\n\n                        <article class=\"flex items-start\">\n                    <a href=\"https:\/\/www.digiterre.com\/us\/2025\/05\/21\/modernizing-c-in-tier-1-banks-balancing-performance-and-progress\/\" class=\"contents\" title=\"Modernizing C++ in Tier 1 Banks: Balancing Performance and Progress\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-150x150.jpg\" class=\"rounded-digiterre w-24 h-24 lg:w-36 lg:h-36 md:mr-4 shadow-digiterre shadow-dark\/[.15] hover:scale-105 transition-all duration-300 wp-post-image\" alt=\"\" srcset=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-150x150.jpg 150w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-300x300.jpg 300w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-1024x1024.jpg 1024w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-768x768.jpg 768w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-1536x1536.jpg 1536w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-3-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>\n\n                    <div class=\"flex flex-wrap flex-col justify-between h-full pl-4 md:pl-0\">\n                        <a href=\"https:\/\/www.digiterre.com\/us\/2025\/05\/21\/modernizing-c-in-tier-1-banks-balancing-performance-and-progress\/\">\n                            <h4 class=\"text-base lg:text-xl mb-4 font-semibold md:mb-2 hover:text-primary-dark transition-all duration-300\">Modernizing C++ in Tier 1 Banks: Balancing Performance and Progress<\/h4>\n                        <\/a>\n                        <div class=\"font-visby text-sm\">\n                            <p class=\"mb-1 text-sm md:text-base\">Date: <strong>21\/05\/25<\/strong><\/p>\n                            <p class=\"mb-0 text-sm md:text-base\">By: <strong>Digiterre<\/strong><\/p>\n                        <\/div>\n                    <\/div>\n                <\/article>\n\n                        <article class=\"flex items-start\">\n                    <a href=\"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/\" class=\"contents\" title=\"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-150x150.jpg\" class=\"rounded-digiterre w-24 h-24 lg:w-36 lg:h-36 md:mr-4 shadow-digiterre shadow-dark\/[.15] hover:scale-105 transition-all duration-300 wp-post-image\" alt=\"\" srcset=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-150x150.jpg 150w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-300x300.jpg 300w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-1024x1024.jpg 1024w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-768x768.jpg 768w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-1536x1536.jpg 1536w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>\n\n                    <div class=\"flex flex-wrap flex-col justify-between h-full pl-4 md:pl-0\">\n                        <a href=\"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/\">\n                            <h4 class=\"text-base lg:text-xl mb-4 font-semibold md:mb-2 hover:text-primary-dark transition-all duration-300\">Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0<\/h4>\n                        <\/a>\n                        <div class=\"font-visby text-sm\">\n                            <p class=\"mb-1 text-sm md:text-base\">Date: <strong>07\/05\/25<\/strong><\/p>\n                            <p class=\"mb-0 text-sm md:text-base\">By: <strong>Digiterre<\/strong><\/p>\n                        <\/div>\n                    <\/div>\n                <\/article>\n\n                        <article class=\"flex items-start\">\n                    <a href=\"https:\/\/www.digiterre.com\/us\/2025\/04\/30\/data-under-pressure-rethinking-data-management-in-a-volatile-tariff-driven-market\/\" class=\"contents\" title=\"Data Under Pressure: Rethinking Data Management in a Volatile, Tariff-Driven Market\u00a0\"><img loading=\"lazy\" decoding=\"async\" width=\"150\" height=\"150\" src=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-150x150.jpg\" class=\"rounded-digiterre w-24 h-24 lg:w-36 lg:h-36 md:mr-4 shadow-digiterre shadow-dark\/[.15] hover:scale-105 transition-all duration-300 wp-post-image\" alt=\"\" srcset=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-150x150.jpg 150w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-300x300.jpg 300w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-1024x1024.jpg 1024w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-768x768.jpg 768w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-1536x1536.jpg 1536w, https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-2-2048x2048.jpg 2048w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/a>\n\n                    <div class=\"flex flex-wrap flex-col justify-between h-full pl-4 md:pl-0\">\n                        <a href=\"https:\/\/www.digiterre.com\/us\/2025\/04\/30\/data-under-pressure-rethinking-data-management-in-a-volatile-tariff-driven-market\/\">\n                            <h4 class=\"text-base lg:text-xl mb-4 font-semibold md:mb-2 hover:text-primary-dark transition-all duration-300\">Data Under Pressure: Rethinking Data Management in a Volatile, Tariff-Driven Market\u00a0<\/h4>\n                        <\/a>\n                        <div class=\"font-visby text-sm\">\n                            <p class=\"mb-1 text-sm md:text-base\">Date: <strong>30\/04\/25<\/strong><\/p>\n                            <p class=\"mb-0 text-sm md:text-base\">By: <strong>Laurence Pisani<\/strong><\/p>\n                        <\/div>\n                    <\/div>\n                <\/article>\n\n        \n    <\/div>\n    <div class=\"w-full lg:w-1\/4 lg:pl-4 py-6 mt-8 lg:mt-0 relative after:content-[''] after:absolute after:top-0 after:left-0 after:w-full after:h-[2px] lg:after:w-[2px] lg:after:h-[100%] after:bg-dark after:rounded-full\">\n        <h3 class=\"text-4xl font-semibold mb-2\">Follow Us<\/h3>\n        <p class=\"text-digi-grey font-semibold\">Get the latest news and stay up to date<\/p>\n        <ul class=\"font-visby\">\n                            <li class=\"py-4 lg:pl-4 group relative after:content-[''] after:absolute after:bottom-0 after:left-0 after:w-full after:h-[2px] after:bg-light after:rounded-full\" title=\"Twitter\">\n                    <a href=\"https:\/\/twitter.com\/digiterre\" rel=\"noopener norefferer nofollow\" class=\"mb-0 block font-semibold text-dark group-hover:text-primary\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"24.5\" height=\"19.899\" viewBox=\"0 0 24.5 19.899\" class=\"inline-block w-8 mr-2 group-hover:scale-110 transition-all duration-300\">\n                            <g id=\"Group_508\" data-name=\"Group 508\" transform=\"translate(-967 -5591)\">\n                                <path id=\"Icon_awesome-twitter\" data-name=\"Icon awesome-twitter\" d=\"M21.982,8.34c.016.218.016.435.016.653A14.189,14.189,0,0,1,7.711,23.279,14.19,14.19,0,0,1,0,21.025a10.388,10.388,0,0,0,1.213.062,10.056,10.056,0,0,0,6.234-2.145A5.03,5.03,0,0,1,2.752,15.46a6.332,6.332,0,0,0,.948.078,5.311,5.311,0,0,0,1.321-.171A5.022,5.022,0,0,1,.995,10.439v-.062a5.057,5.057,0,0,0,2.27.637A5.029,5.029,0,0,1,1.71,4.3,14.273,14.273,0,0,0,12.063,9.552a5.668,5.668,0,0,1-.124-1.15,5.026,5.026,0,0,1,8.69-3.436,9.886,9.886,0,0,0,3.187-1.213,5.008,5.008,0,0,1-2.207,2.767A10.066,10.066,0,0,0,24.5,5.744a10.794,10.794,0,0,1-2.518,2.6Z\" transform=\"translate(967 5587.619)\" fill=\"#0562c7\" \/>\n                            <\/g>\n                        <\/svg>\n                        @digiterre\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"22.627\" height=\"22.627\" viewBox=\"0 0 22.627 22.627\" class=\"float-right inline-block transition-all duration-300 group-hover:rotate-45\">\n                            <path id=\"Icon_material-arrow-forward\" data-name=\"Icon material-arrow-forward\" d=\"M14,6,12.59,7.41,18.17,13H6v2H18.17l-5.58,5.59L14,22l8-8Z\" transform=\"translate(-8.485 11.314) rotate(-45)\" \/>\n                        <\/svg>\n                    <\/a>\n                <\/li>\n            \n                            <li class=\"py-4 lg:pl-4 group relative after:content-[''] after:absolute after:bottom-0 after:left-0 after:w-full after:h-[2px] after:bg-light after:rounded-full\">\n                    <a href=\"https:\/\/www.linkedin.com\/company\/digiterre\/mycompany\/\" rel=\"noopener norefferer nofollow\" class=\"mb-0 block font-semibold text-dark group-hover:text-primary\" title=\"LinkedIn\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"20.1\" height=\"20.099\" viewBox=\"0 0 20.1 20.099\" class=\"inline-block w-8 mr-2  group-hover:scale-110 transition-all duration-300\">\n                            <g id=\"Group_510\" data-name=\"Group 510\" transform=\"translate(-1041 -5642)\">\n                                <path id=\"Icon_awesome-linkedin-in\" data-name=\"Icon awesome-linkedin-in\" d=\"M4.5,20.1H.332V6.681H4.5ZM2.413,4.85A2.425,2.425,0,1,1,4.827,2.414,2.434,2.434,0,0,1,2.413,4.85ZM20.1,20.1H15.937V13.567c0-1.557-.031-3.553-2.167-3.553-2.167,0-2.5,1.691-2.5,3.441V20.1H7.109V6.681h4V8.511h.058a4.379,4.379,0,0,1,3.943-2.167c4.217,0,4.993,2.777,4.993,6.384V20.1Z\" transform=\"translate(1041 5641.999)\" fill=\"#0562c7\" \/>\n                            <\/g>\n                        <\/svg>\n                        \/digiterre\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"22.627\" height=\"22.627\" viewBox=\"0 0 22.627 22.627\" class=\"float-right inline-block transition-all duration-300 group-hover:rotate-45\">\n                            <path id=\"Icon_material-arrow-forward\" data-name=\"Icon material-arrow-forward\" d=\"M14,6,12.59,7.41,18.17,13H6v2H18.17l-5.58,5.59L14,22l8-8Z\" transform=\"translate(-8.485 11.314) rotate(-45)\" \/>\n                        <\/svg>\n                    <\/a>\n                <\/li>\n            \n                            <li class=\"py-4 lg:pl-4 group relative after:content-[''] after:absolute after:bottom-0 after:left-0 after:w-full after:h-[2px] after:bg-light after:rounded-full\">\n                    <a href=\"https:\/\/www.youtube.com\/@digiterreltd\/videos\" rel=\"noopener norefferer nofollow\" class=\"mb-0 block font-semibold text-dark group-hover:text-primary\" title=\"YouTube\">\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"28.501\" height=\"20.04\" viewBox=\"0 0 28.501 20.04\" class=\"inline-block w-8 mr-2  group-hover:scale-110 transition-all duration-300\">\n                            <g id=\"Group_509\" data-name=\"Group 509\" transform=\"translate(-1141.999 -5649)\">\n                                <path id=\"Icon_awesome-youtube\" data-name=\"Icon awesome-youtube\" d=\"M28.955,7.636A3.581,3.581,0,0,0,26.435,5.1C24.213,4.5,15.3,4.5,15.3,4.5s-8.912,0-11.135.6a3.581,3.581,0,0,0-2.52,2.536,37.568,37.568,0,0,0-.6,6.9,37.568,37.568,0,0,0,.6,6.9,3.528,3.528,0,0,0,2.52,2.5c2.223.6,11.135.6,11.135.6s8.912,0,11.135-.6a3.528,3.528,0,0,0,2.52-2.5,37.568,37.568,0,0,0,.6-6.9,37.568,37.568,0,0,0-.6-6.9ZM12.386,18.778V10.3l7.449,4.238-7.449,4.238Z\" transform=\"translate(1140.949 5644.5)\" fill=\"#0562c7\" \/>\n                            <\/g>\n                        <\/svg>\n                        @digiterreltd4754\n                        <svg xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"22.627\" height=\"22.627\" viewBox=\"0 0 22.627 22.627\" class=\"float-right inline-block transition-all duration-300 group-hover:rotate-45\">\n                            <path id=\"Icon_material-arrow-forward\" data-name=\"Icon material-arrow-forward\" d=\"M14,6,12.59,7.41,18.17,13H6v2H18.17l-5.58,5.59L14,22l8-8Z\" transform=\"translate(-8.485 11.314) rotate(-45)\" \/>\n                        <\/svg>\n                    <\/a>\n                <\/li>\n                    <\/ul>\n    <\/div>\n<\/section>\n\n<section id=\"block_b045ea357513798e5e57eaa0ecc8dfb0\" class=\"acf-blocks cta-background mx-auto container \">\n    <div class=\"rounded-digiterre-large flex flex-wrap items-center justify-center lg:justify-between px-4 py-8 lg:px-20 lg:py-28 bg-secondary-light bg-center bg-no-repeat bg-cover text-center lg:text-left shadow-digiterre shadow-primary\/25\" style=\"background-image:linear-gradient(0deg, rgba(0, 0, 0, 0.6), rgba(0, 0, 0, 0.6)), url(https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2023\/03\/cta-ph.jpg);\">\n        <div class=\"lg:w-1\/2 text-white\">\n            <h3 class=\"text-4xl lg:text-5xl xl:text-7xl \">Get in touch<\/h3>\n                        <p class=\"lg:text-2xl\">If you would like to find out more, or want to discuss your current challenges with one of the team, please get in touch.<\/p>\n                    <\/div>\n                <div class=\"lg:w-2\/5 flex flex-wrap gap-4 justify-center text-center mt-8 lg:mt-0\">\n                        <a \n            href=\"https:\/\/www.digiterre.com\/us\/us\/contact-us\/\"\n            class=\"btn !mb-0\"\n                        target=\"_blank\"               \n            rel=\"noopener norefferer nofollow\"\n                        >\n                Get in touch            <\/a>\n            \n                        <a \n            href=\"https:\/\/apply.workable.com\/digiterre\/?lng=en\"\n            class=\"btn btn-invert !mb-0\"\n                        target=\"_blank\"               \n            rel=\"noopener norefferer nofollow\"\n                        >\n                Join our team            <\/a>\n                    <\/div>\n            <\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"<p>Recent cyber-attacks on major retailers have highlighted for financial services firms the urgent need to modernize outdated systems and strengthen security to protect sensitive data.<\/p>\n","protected":false},"author":4,"featured_media":3697,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[6],"tags":[],"class_list":["post-3696","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech-insights"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA\" \/>\n<meta property=\"og:description\" content=\"Recent cyber-attacks on major retailers have highlighted for financial services firms the urgent need to modernize outdated systems and strengthen security to protect sensitive data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"Digiterre USA\" \/>\n<meta property=\"article:published_time\" content=\"2025-05-07T11:54:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-25T14:46:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2380\" \/>\n\t<meta property=\"og:image:height\" content=\"2380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Digiterre\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@aaronSSD\" \/>\n<meta name=\"twitter:site\" content=\"@digiterre\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Digiterre\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/\"},\"author\":{\"name\":\"Digiterre\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#\\\/schema\\\/person\\\/f453516b93cc23de83b4262a3507c762\"},\"headline\":\"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0\",\"datePublished\":\"2025-05-07T11:54:00+00:00\",\"dateModified\":\"2025-06-25T14:46:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/06\\\/Tech-blog-1-4.jpg\",\"articleSection\":[\"Tech Insights\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/\",\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/\",\"name\":\"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/06\\\/Tech-blog-1-4.jpg\",\"datePublished\":\"2025-05-07T11:54:00+00:00\",\"dateModified\":\"2025-06-25T14:46:32+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/06\\\/Tech-blog-1-4.jpg\",\"contentUrl\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/06\\\/Tech-blog-1-4.jpg\",\"width\":2380,\"height\":2380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/2025\\\/05\\\/07\\\/legacy-threat-cybersecurity-lessons-from-retail-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#website\",\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/\",\"name\":\"Digiterre USA\",\"description\":\"Real time software engineering solution provider that enables technology transformation for energy and commodities trading organisations.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#organization\",\"name\":\"Digiterre USA\",\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/Digiterre-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2023\\\/10\\\/Digiterre-logo.png\",\"width\":3368,\"height\":1217,\"caption\":\"Digiterre USA\"},\"image\":{\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/digiterre\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/#\\\/schema\\\/person\\\/f453516b93cc23de83b4262a3507c762\",\"name\":\"Digiterre\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g\",\"caption\":\"Digiterre\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/aaronSSD\"],\"url\":\"https:\\\/\\\/www.digiterre.com\\\/us\\\/author\\\/digiterre\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA","og_description":"Recent cyber-attacks on major retailers have highlighted for financial services firms the urgent need to modernize outdated systems and strengthen security to protect sensitive data.","og_url":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/","og_site_name":"Digiterre USA","article_published_time":"2025-05-07T11:54:00+00:00","article_modified_time":"2025-06-25T14:46:32+00:00","og_image":[{"width":2380,"height":2380,"url":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg","type":"image\/jpeg"}],"author":"Digiterre","twitter_card":"summary_large_image","twitter_creator":"@aaronSSD","twitter_site":"@digiterre","twitter_misc":{"Written by":"Digiterre","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#article","isPartOf":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/"},"author":{"name":"Digiterre","@id":"https:\/\/www.digiterre.com\/us\/#\/schema\/person\/f453516b93cc23de83b4262a3507c762"},"headline":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0","datePublished":"2025-05-07T11:54:00+00:00","dateModified":"2025-06-25T14:46:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.digiterre.com\/us\/#organization"},"image":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg","articleSection":["Tech Insights"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/","url":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/","name":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0 - Digiterre USA","isPartOf":{"@id":"https:\/\/www.digiterre.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg","datePublished":"2025-05-07T11:54:00+00:00","dateModified":"2025-06-25T14:46:32+00:00","breadcrumb":{"@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#primaryimage","url":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg","contentUrl":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2025\/06\/Tech-blog-1-4.jpg","width":2380,"height":2380},{"@type":"BreadcrumbList","@id":"https:\/\/www.digiterre.com\/us\/2025\/05\/07\/legacy-threat-cybersecurity-lessons-from-retail-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.digiterre.com\/us\/"},{"@type":"ListItem","position":2,"name":"Legacy Threat: Cybersecurity Lessons from Retail Attacks\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/www.digiterre.com\/us\/#website","url":"https:\/\/www.digiterre.com\/us\/","name":"Digiterre USA","description":"Real time software engineering solution provider that enables technology transformation for energy and commodities trading organisations.","publisher":{"@id":"https:\/\/www.digiterre.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.digiterre.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.digiterre.com\/us\/#organization","name":"Digiterre USA","url":"https:\/\/www.digiterre.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.digiterre.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2023\/10\/Digiterre-logo.png","contentUrl":"https:\/\/www.digiterre.com\/us\/wp-content\/uploads\/sites\/2\/2023\/10\/Digiterre-logo.png","width":3368,"height":1217,"caption":"Digiterre USA"},"image":{"@id":"https:\/\/www.digiterre.com\/us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/digiterre"]},{"@type":"Person","@id":"https:\/\/www.digiterre.com\/us\/#\/schema\/person\/f453516b93cc23de83b4262a3507c762","name":"Digiterre","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/79050c984a099f8e99d8ba29023b386dc383f0f134d9130998c7246334d1698f?s=96&d=mm&r=g","caption":"Digiterre"},"sameAs":["https:\/\/x.com\/aaronSSD"],"url":"https:\/\/www.digiterre.com\/us\/author\/digiterre\/"}]}},"_links":{"self":[{"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/posts\/3696","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/comments?post=3696"}],"version-history":[{"count":0,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/posts\/3696\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/media\/3697"}],"wp:attachment":[{"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/media?parent=3696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/categories?post=3696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.digiterre.com\/us\/wp-json\/wp\/v2\/tags?post=3696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}