{"id":1833,"date":"2025-01-22T01:01:55","date_gmt":"2025-01-22T01:01:55","guid":{"rendered":"https:\/\/www.logicminds.com.au\/?p=1833"},"modified":"2025-06-26T02:42:26","modified_gmt":"2025-06-26T02:42:26","slug":"cybersecurity-in-software-development","status":"publish","type":"post","link":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/","title":{"rendered":"Why Cybersecurity in Software Development Matters"},"content":{"rendered":"<p>[et_pb_section fb_built=&#8221;1&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;2px|||||&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.27.4&#8243; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; width=&#8221;100%&#8221; max_width=&#8221;2560px&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.16&#8243; custom_padding=&#8221;|||&#8221; global_colors_info=&#8221;{}&#8221; custom_padding__hover=&#8221;|||&#8221;][et_pb_text _builder_version=&#8221;4.27.4&#8243; ul_line_height=&#8221;1.6em&#8221; ol_line_height=&#8221;1.6em&#8221; background_size=&#8221;initial&#8221; background_position=&#8221;top_left&#8221; background_repeat=&#8221;repeat&#8221; custom_css_free_form=&#8221;ol li {||  padding-bottom: 20px;||}&#8221; global_colors_info=&#8221;{}&#8221;]<\/p>\n<p><span style=\"font-weight: 400;\">In today\u2019s interconnected digital era, the significance of <\/span><span style=\"font-weight: 400;\">cybersecurity in <a href=\"https:\/\/www.logicminds.com.au\/software-development\/\">software development<\/a> cannot be overstated. Organisations across various sectors are increasingly reliant on software to streamline operations, provide customer solutions, and gain a competitive edge. Yet, this reliance introduces risks, making cybersecurity an essential aspect of every software development project. Logic Minds, a leading innovator in software solutions, is committed to ensuring that security remains at the forefront of development practices.<\/span><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>Why Cybersecurity Matters<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.cyber.gov.au\/about-us\/view-all-content\/reports-and-statistics\/annual-cyber-threat-report-2023-2024\">Cyber threats<\/a> are more sophisticated and pervasive than ever, targeting vulnerabilities in software systems to exploit sensitive data, disrupt operations, or cause reputational harm. The absence of robust cybersecurity measures can lead to dire consequences, such as financial loss, legal implications, and customer mistrust. Recognising these challenges, organisations like Logic Minds advocate for a proactive approach to cybersecurity within the development lifecycle.<\/span><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>Integrating Security Early in Development<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The practice of integrating security measures during the initial stages of software development\u2014commonly referred to as &#8220;shift-left security&#8221;\u2014has emerged as a best practice. By embedding security protocols early, development teams can identify and address potential vulnerabilities before they escalate into larger issues. This strategy is cost-effective and ensures that the final product is resilient against a broad spectrum of cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Logic Minds has implemented advanced methodologies to ensure security integration is seamless and efficient. For example, by adopting <a href=\"https:\/\/www.logicminds.com.au\/webdev\/\">secure coding practices<\/a>, conducting regular vulnerability assessments, and leveraging automated security tools, the company significantly reduces the risk of exploitable flaws in their applications.<\/span><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>Key Elements of Cybersecurity in Software Development\u00a0<\/strong><\/h2>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Threat Modelling and Risk Assessment<\/b><span style=\"font-weight: 400;\"> Early in the development process, identifying potential threats and assessing risks is crucial. This involves understanding the software\u2019s attack surface and prioritising high-risk areas for enhanced protection.<\/span><span style=\"font-weight: 400;\"><br \/><\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><b>Secure Coding Practices<\/b> Developers must follow coding standards that minimise vulnerabilities, such as buffer overflows, injection attacks, or insecure authentication. Logic Minds ensures its teams are trained and equipped to follow such standards rigorously.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Regular Security Testing<\/b><span style=\"font-weight: 400;\"> Continuous testing, including static and dynamic code analysis, penetration testing, and automated scans, ensures that no vulnerabilities slip through the cracks. These tests should be part of a comprehensive quality assurance strategy.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><b>Data Protection and Encryption<\/b> To <b>protect applications and data<\/b>, it is vital to encrypt sensitive information both at rest and in transit. Secure key management and compliance with data protection regulations like the GDPR and Australia&#8217;s Privacy Act also play critical roles.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\"><b>Incident Response and Patch Management<\/b> Even with the best preventive measures, breaches can occur. Having an incident response plan and a robust patch management strategy enables organisations to respond swiftly and minimise impact.<\/span><\/li>\n<\/ol>\n<p><img decoding=\"async\" src=\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/single_post_guide-3.webp\" style=\"margin-top: 20px; border-radius: 5px;\" \/><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>The Role of Cybersecurity in Ensuring Trust<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">Strong cybersecurity measures in software development foster trust among users and stakeholders. Customers are more likely to engage with applications that prioritise data protection and user safety. Similarly, businesses that demonstrate a commitment to cybersecurity are better positioned to comply with regulatory requirements and avoid legal complications.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Logic Minds has consistently demonstrated its commitment to building secure and reliable software solutions. By prioritising cybersecurity, we ensure our clients receive products that meet the highest standards of safety and efficiency.<\/span><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>\u00a0Future Trends and Challenges<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">As technology evolves, new challenges in cybersecurity in software development emerge. The rise of artificial intelligence (AI), Internet of Things (IoT), and blockchain technology introduces additional layers of complexity. Adapting to these trends requires ongoing investment in education, tools, and research.<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><a href=\"https:\/\/www.logicminds.com.au\/\">Logic Minds<\/a> is at the forefront of these advancements, investing in cutting-edge technologies to preempt emerging threats. Our forward-thinking approach enables us to stay ahead in an ever-changing digital landscape.<\/span><\/p>\n<h2 style=\"margin-top: 20px;\"><strong>Conclusion<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">The integration of cybersecurity into software development is no longer optional\u2014it is a necessity. As cyber threats continue to grow in scale and sophistication, organisations must adopt robust security measures to protect their applications and data. By championing proactive security practices, Logic Minds exemplifies how companies can build software that is not only functional but also secure.<\/span>.<\/p>\n<p>&nbsp;<\/p>\n<p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s interconnected digital era, the significance of cybersecurity in software development cannot be overstated. Organisations across various sectors are increasingly reliant on software to streamline operations, provide customer solutions, and gain a competitive edge. Yet, this reliance introduces risks, making cybersecurity an essential aspect of every software development project. Logic Minds, a leading innovator [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":1836,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-1833","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Cybersecurity Matters in Dev?<\/title>\n<meta name=\"description\" content=\"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Cybersecurity Matters in Dev?\" \/>\n<meta property=\"og:description\" content=\"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\" \/>\n<meta property=\"og:site_name\" content=\"Logic Minds\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-22T01:01:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-26T02:42:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"904\" \/>\n\t<meta property=\"og:image:height\" content=\"538\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"Logic Minds\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Logic Minds\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\"},\"author\":{\"name\":\"Logic Minds\",\"@id\":\"https:\/\/www.logicminds.com.au\/#\/schema\/person\/219a88ad88c909c19f09fc4a6a6d6062\"},\"headline\":\"Why Cybersecurity in Software Development Matters\",\"datePublished\":\"2025-01-22T01:01:55+00:00\",\"dateModified\":\"2025-06-26T02:42:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\"},\"wordCount\":754,\"publisher\":{\"@id\":\"https:\/\/www.logicminds.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\",\"url\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\",\"name\":\"Why Cybersecurity Matters in Dev?\",\"isPartOf\":{\"@id\":\"https:\/\/www.logicminds.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp\",\"datePublished\":\"2025-01-22T01:01:55+00:00\",\"dateModified\":\"2025-06-26T02:42:26+00:00\",\"description\":\"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage\",\"url\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp\",\"contentUrl\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp\",\"width\":904,\"height\":538,\"caption\":\"Glowing digital shield with keyhole and circuitry, symbolizing cybersecurity and protection.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.logicminds.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Cybersecurity in Software Development Matters\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.logicminds.com.au\/#website\",\"url\":\"https:\/\/www.logicminds.com.au\/\",\"name\":\"Logic Minds\",\"description\":\"Official Website\",\"publisher\":{\"@id\":\"https:\/\/www.logicminds.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.logicminds.com.au\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.logicminds.com.au\/#organization\",\"name\":\"Logic Minds\",\"url\":\"https:\/\/www.logicminds.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.logicminds.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2024\/10\/vertical_logicmind2.png\",\"contentUrl\":\"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2024\/10\/vertical_logicmind2.png\",\"width\":450,\"height\":270,\"caption\":\"Logic Minds\"},\"image\":{\"@id\":\"https:\/\/www.logicminds.com.au\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.logicminds.com.au\/#\/schema\/person\/219a88ad88c909c19f09fc4a6a6d6062\",\"name\":\"Logic Minds\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.logicminds.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/78c98f61e73f4e64e02f8605b5c92061d7a3651c7a84f445985b2a1b8e14534d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/78c98f61e73f4e64e02f8605b5c92061d7a3651c7a84f445985b2a1b8e14534d?s=96&d=mm&r=g\",\"caption\":\"Logic Minds\"},\"sameAs\":[\"https:\/\/www.logicminds.com.au\"],\"url\":\"https:\/\/www.logicminds.com.au\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Cybersecurity Matters in Dev?","description":"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/","og_locale":"en_US","og_type":"article","og_title":"Why Cybersecurity Matters in Dev?","og_description":"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.","og_url":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/","og_site_name":"Logic Minds","article_published_time":"2025-01-22T01:01:55+00:00","article_modified_time":"2025-06-26T02:42:26+00:00","og_image":[{"width":904,"height":538,"url":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp","type":"image\/webp"}],"author":"Logic Minds","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Logic Minds","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#article","isPartOf":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/"},"author":{"name":"Logic Minds","@id":"https:\/\/www.logicminds.com.au\/#\/schema\/person\/219a88ad88c909c19f09fc4a6a6d6062"},"headline":"Why Cybersecurity in Software Development Matters","datePublished":"2025-01-22T01:01:55+00:00","dateModified":"2025-06-26T02:42:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/"},"wordCount":754,"publisher":{"@id":"https:\/\/www.logicminds.com.au\/#organization"},"image":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/","url":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/","name":"Why Cybersecurity Matters in Dev?","isPartOf":{"@id":"https:\/\/www.logicminds.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage"},"image":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage"},"thumbnailUrl":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp","datePublished":"2025-01-22T01:01:55+00:00","dateModified":"2025-06-26T02:42:26+00:00","description":"Discover how cybersecurity in software development in Melbourne protects your business from threats. Learn the strategies and best practices.","breadcrumb":{"@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#primaryimage","url":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp","contentUrl":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2025\/01\/Logicmind-post-The-Importance-of-Cybersecurity-in-Software-Development-Projects.webp","width":904,"height":538,"caption":"Glowing digital shield with keyhole and circuitry, symbolizing cybersecurity and protection."},{"@type":"BreadcrumbList","@id":"https:\/\/www.logicminds.com.au\/blog\/cybersecurity-in-software-development\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.logicminds.com.au\/"},{"@type":"ListItem","position":2,"name":"Why Cybersecurity in Software Development Matters"}]},{"@type":"WebSite","@id":"https:\/\/www.logicminds.com.au\/#website","url":"https:\/\/www.logicminds.com.au\/","name":"Logic Minds","description":"Official Website","publisher":{"@id":"https:\/\/www.logicminds.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.logicminds.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.logicminds.com.au\/#organization","name":"Logic Minds","url":"https:\/\/www.logicminds.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.logicminds.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2024\/10\/vertical_logicmind2.png","contentUrl":"https:\/\/www.logicminds.com.au\/wp-content\/uploads\/2024\/10\/vertical_logicmind2.png","width":450,"height":270,"caption":"Logic Minds"},"image":{"@id":"https:\/\/www.logicminds.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.logicminds.com.au\/#\/schema\/person\/219a88ad88c909c19f09fc4a6a6d6062","name":"Logic Minds","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.logicminds.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/78c98f61e73f4e64e02f8605b5c92061d7a3651c7a84f445985b2a1b8e14534d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78c98f61e73f4e64e02f8605b5c92061d7a3651c7a84f445985b2a1b8e14534d?s=96&d=mm&r=g","caption":"Logic Minds"},"sameAs":["https:\/\/www.logicminds.com.au"],"url":"https:\/\/www.logicminds.com.au\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/posts\/1833","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/comments?post=1833"}],"version-history":[{"count":24,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/posts\/1833\/revisions"}],"predecessor-version":[{"id":2651,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/posts\/1833\/revisions\/2651"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/media\/1836"}],"wp:attachment":[{"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/media?parent=1833"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/categories?post=1833"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.logicminds.com.au\/wp-json\/wp\/v2\/tags?post=1833"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}