{"id":3945,"date":"2024-12-28T02:19:06","date_gmt":"2024-12-28T02:19:06","guid":{"rendered":"https:\/\/logsheet.digital\/blog\/?p=3945"},"modified":"2024-12-21T02:24:44","modified_gmt":"2024-12-21T02:24:44","slug":"data-security-digital-logsheets-challenges-strategies-calibration","status":"publish","type":"post","link":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/","title":{"rendered":"Data Security in Digital Logsheets: Challenges and Security Strategies in Calibration"},"content":{"rendered":"\n<p>In this digital era, many industries have adopted technology to enhance efficiency and reliability in their operations, including calibration processes. A significant development is the use of <strong>digital logsheets<\/strong>, which replace manual record-keeping in calibration processes. Digital logsheets not only help improve efficiency and accuracy but also introduce new challenges, particularly regarding <strong>data security<\/strong>.<\/p>\n\n\n\n<p>This article will discuss the security challenges faced in the use of digital logsheets and strategies that can be taken to protect calibration data.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Are Digital Logsheets and Why Is Data Security Important?<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4-1024x576.png\" alt=\"What Are Digital Logsheets and Why Is Data Security Important?\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read More: <a href=\"https:\/\/logsheet.digital\/blog\/en\/optimizing-calibration-process-with-digital-logsheets\/\">Optimizing the Calibration Process Through the Implementation of Digital Logsheets<\/a><\/p>\n\n\n\n<p><strong>Digital logsheets<\/strong> are electronic record-keeping systems used to document calibration results and maintenance of equipment digitally. This system allows for faster, more accurate, and organized recording compared to manual methods. However, since calibration data is stored digitally, protecting this data becomes critically important.<\/p>\n\n\n\n<p>Sensitive calibration data, especially in industries such as pharmaceuticals, manufacturing, and technology, must be kept confidential. If this data is leaked or misused, it can result in significant losses, both financially and operationally. Therefore, data security in digital logsheets must be a top priority.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Challenges in Digital Logsheets<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/23-16-1024x576.png\" alt=\"Security Challenges in Digital Logsheets\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read More: <a href=\"https:\/\/logsheet.digital\/blog\/en\/security-transformation-at-central-java-2-power-plant-introduction-of-the-go-safe-application-by-pt-nocola-iot\/\">Security Transformation at Central Java 2 Power Plant: Introduction of the GO SAFE Application by PT. Nocola IoT<\/a><\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. <strong>Cybersecurity Threats<\/strong><\/h4>\n\n\n\n<p>In digital systems, one of the greatest threats is <strong>cyber attacks<\/strong>. These can include malware, ransomware, or data breaches. Such attacks can lead to the loss of crucial calibration data necessary for maintaining the accuracy of measuring instruments. Additionally, hackers could use stolen data for malicious purposes, such as falsifying reports or sabotage.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. <strong>Unauthorized Access<\/strong><\/h4>\n\n\n\n<p>Without proper protections, calibration data can be accessed by unauthorized individuals. Unauthorized access can occur due to <strong>lax access management<\/strong>, such as weak password use or a lack of two-factor authentication. This can lead to data being altered, deleted, or even used for unethical purposes.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. <strong>Data Loss<\/strong><\/h4>\n\n\n\n<p>Even though data is stored digitally, the risk of <strong>data loss<\/strong> still exists. For instance, server failures or system malfunctions can result in the permanent loss of calibration data. Additionally, if adequate data backups are not in place, lost data may be difficult to recover, which can disrupt operations.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. <strong>Regulatory Compliance<\/strong><\/h4>\n\n\n\n<p>Certain industries must comply with stringent regulations regarding <strong>data storage and management<\/strong>. For example, in the pharmaceutical or medical industry, calibration data must be stored securely and in compliance with standards set by regulatory bodies. Companies that fail to meet these regulations may face legal sanctions.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5. <strong>User Errors<\/strong><\/h4>\n\n\n\n<p>Humans remain the most vulnerable element in data security systems. <strong>User errors<\/strong>, such as accidentally deleting important data or sharing login information with unauthorized individuals, can jeopardize the security of digital logsheets. Insufficient security training can also increase the likelihood of such mistakes.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Security Strategies to Protect Digital Logsheets Data<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/20-5-1024x576.png\" alt=\"Security Strategies to Protect Digital Logsheets Data\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read More: <a href=\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets\/\">Data Security in Digital Logsheets: Challenges and Security Strategies<\/a><\/p>\n\n\n\n<p>To tackle these challenges, several <strong>security strategies<\/strong> can be implemented in the use of digital logsheets. Here are some steps that can be taken:<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">1. <strong>Implement Two-Factor Authentication (2FA)<\/strong><\/h4>\n\n\n\n<p>Two-factor authentication is a simple yet highly effective step to enhance security access to digital logsheets. With 2FA, users must pass through two layers of verification before accessing data, such as a combination of a password and a code sent to their device. This helps prevent unauthorized access by unauthorized parties.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">2. <strong>Data Encryption<\/strong><\/h4>\n\n\n\n<p><strong>Encryption<\/strong> is one of the best ways to protect sensitive data. Encrypted calibration data cannot be read without the correct decryption key. This is crucial to ensure that even if data is stolen, attackers cannot access or exploit the information. All stored data, including that transmitted between devices and servers, should be encrypted using strong encryption standards like AES (Advanced Encryption Standard).<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">3. <strong>Strict Access Management<\/strong><\/h4>\n\n\n\n<p><strong>Access control<\/strong> is key to protecting digital logsheets data. Only users with specific authority or roles should be allowed access to calibration data. Additionally, using <strong>role-based access control (RBAC)<\/strong> can help limit access to individuals who truly need it based on their tasks and responsibilities.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">4. <strong>Regular Data Backups<\/strong><\/h4>\n\n\n\n<p>Data loss due to system failure or cyber attacks can be mitigated by implementing <strong>regular data backups<\/strong>. Calibration data should be copied regularly and stored in a secure location, separate from the main server. These backups should also be encrypted to prevent unauthorized access.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">5. <strong>User Security Training<\/strong><\/h4>\n\n\n\n<p>Users are often the target of attacks, such as <strong>phishing<\/strong> or social manipulation. Therefore, it is crucial to provide proper security training to all staff involved in using digital logsheets. They should be trained to recognize cyber threats, manage passwords securely, and adhere to established security procedures.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">6. <strong>Use of SSL\/TLS Certificates<\/strong><\/h4>\n\n\n\n<p>If digital logsheets are accessed via the internet, using <strong>SSL\/TLS certificates<\/strong> is essential to protect data in transit. SSL\/TLS encrypts the connection between users and servers, ensuring that data cannot be intercepted or altered by third parties during transmission.<\/p>\n\n\n\n<h4 class=\"wp-block-heading\">7. <strong>Regular Monitoring and Auditing<\/strong><\/h4>\n\n\n\n<p>Digital logsheets systems must always be <strong>monitored<\/strong> to detect any suspicious activities. Furthermore, companies need to conduct <strong>regular audits<\/strong> of their security systems to ensure that all security protocols are implemented correctly. This audit also helps ensure that the company remains compliant with applicable security regulations.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Case Study: Data Security Implementation in Digital Logsheets<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/20-3-1024x576.png\" alt=\"Case Study: Data Security Implementation in Digital Logsheets\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read More: <a href=\"https:\/\/logsheet.digital\/blog\/en\/enhancing-security-and-delivery-quality-digital-logsheets-in-logistics\/\">Enhancing Security and Delivery Quality: Digital Log Sheets in Logistics<\/a><\/p>\n\n\n\n<p>As an example, one large manufacturing company in Indonesia that uses digital logsheets for calibration processes has implemented several stringent security measures. They use end-to-end encryption to protect data, as well as implement two-factor authentication for all technicians accessing the calibration system. Additionally, they routinely perform data backups and system audits to ensure there are no weaknesses in their security protocols.<\/p>\n\n\n\n<p>As a result, this company has been able to maintain the security of their calibration data for years, even amid increasing cyber threats. The implementation of these security strategies has also helped them remain compliant with international regulations regarding data storage.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<figure class=\"wp-block-image\"><img decoding=\"async\" src=\"http:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/09\/20-1-1024x576.png\" alt=\"Conclusion\" \/><\/figure>\n\n\n\n<p class=\"has-text-align-center\">Read More: <a href=\"https:\/\/logsheet.digital\/blog\/en\/digital-logsheets-application-asset-security-oversight\/\">Application of Digital Logsheets in Asset Security Oversight<\/a><\/p>\n\n\n\n<p>Implementing <strong>digital logsheets<\/strong> in calibration processes indeed offers various benefits, such as improved efficiency and accuracy. However, data security must be a top priority when using this system. With various threats such as cyber attacks, unauthorized access, and user errors, companies need to adopt a <strong>comprehensive security strategy<\/strong>, including the use of encryption, two-factor authentication, strict access management, and user training.<\/p>\n\n\n\n<p>These steps will help companies not only protect calibration data but also keep their operations running smoothly and in compliance with applicable regulations. With the right approach, security challenges in digital logsheets can be effectively addressed, allowing companies to maximize the benefits of this technology without compromising data security.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this digital era, many industries have adopted technology to enhance efficiency and reliability in their operations, including calibration processes. A significant development is the use of digital logsheets, which replace manual record-keeping in calibration processes. Digital logsheets not only help improve efficiency and accuracy but also introduce new challenges, particularly regarding data security. This &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Data Security in Digital Logsheets: Challenges and Security Strategies in Calibration&#8221;<\/span><\/a><\/p>\n","protected":false},"author":8,"featured_media":3502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[505],"tags":[797,200,79,158,97,122,562],"class_list":["post-3945","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-education","tag-calibration","tag-data-security","tag-digital-logsheets","tag-implementing","tag-industrial","tag-production","tag-technology","entry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Data Security in Digital Logsheets for Safe Calibration<\/title>\n<meta name=\"description\" content=\"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Security in Digital Logsheets for Safe Calibration\" \/>\n<meta property=\"og:description\" content=\"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Logsheet\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-28T02:19:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-12-21T02:24:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1366\" \/>\n\t<meta property=\"og:image:height\" content=\"768\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Sinthia Dwi Yolandasari\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sinthia Dwi Yolandasari\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\",\"url\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\",\"name\":\"Data Security in Digital Logsheets for Safe Calibration\",\"isPartOf\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png\",\"datePublished\":\"2024-12-28T02:19:06+00:00\",\"dateModified\":\"2024-12-21T02:24:44+00:00\",\"author\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/a56aab2ea92bcba9a8628fd04416a4de\"},\"description\":\"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.\",\"breadcrumb\":{\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage\",\"url\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png\",\"contentUrl\":\"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png\",\"width\":1366,\"height\":768,\"caption\":\"Apa Itu Logsheet Digital? Canva\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/logsheet.digital\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security in Digital Logsheets: Challenges and Security Strategies in Calibration\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#website\",\"url\":\"https:\/\/logsheet.digital\/blog\/\",\"name\":\"Digital Logsheet\",\"description\":\"Start digitalized your logsheet with Digital.Logsheet\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/logsheet.digital\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/a56aab2ea92bcba9a8628fd04416a4de\",\"name\":\"Sinthia Dwi Yolandasari\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a48b833a67f6268712910d76a7a0ab259f9e70ef3cd6ce69e0bbb718e1eeefd4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a48b833a67f6268712910d76a7a0ab259f9e70ef3cd6ce69e0bbb718e1eeefd4?s=96&d=mm&r=g\",\"caption\":\"Sinthia Dwi Yolandasari\"},\"url\":\"https:\/\/logsheet.digital\/blog\/author\/sinthia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security in Digital Logsheets for Safe Calibration","description":"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/","og_locale":"en_US","og_type":"article","og_title":"Data Security in Digital Logsheets for Safe Calibration","og_description":"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.","og_url":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/","og_site_name":"Digital Logsheet","article_published_time":"2024-12-28T02:19:06+00:00","article_modified_time":"2024-12-21T02:24:44+00:00","og_image":[{"width":1366,"height":768,"url":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png","type":"image\/png"}],"author":"Sinthia Dwi Yolandasari","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sinthia Dwi Yolandasari","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/","url":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/","name":"Data Security in Digital Logsheets for Safe Calibration","isPartOf":{"@id":"https:\/\/logsheet.digital\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage"},"image":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage"},"thumbnailUrl":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png","datePublished":"2024-12-28T02:19:06+00:00","dateModified":"2024-12-21T02:24:44+00:00","author":{"@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/a56aab2ea92bcba9a8628fd04416a4de"},"description":"Learn about the data security strategies in digital logsheets to protect calibration processes from cyber threats and unauthorized access.","breadcrumb":{"@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#primaryimage","url":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png","contentUrl":"https:\/\/logsheet.digital\/blog\/wp-content\/uploads\/2024\/08\/16-4.png","width":1366,"height":768,"caption":"Apa Itu Logsheet Digital? Canva"},{"@type":"BreadcrumbList","@id":"https:\/\/logsheet.digital\/blog\/en\/data-security-digital-logsheets-challenges-strategies-calibration\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/logsheet.digital\/blog\/"},{"@type":"ListItem","position":2,"name":"Data Security in Digital Logsheets: Challenges and Security Strategies in Calibration"}]},{"@type":"WebSite","@id":"https:\/\/logsheet.digital\/blog\/#website","url":"https:\/\/logsheet.digital\/blog\/","name":"Digital Logsheet","description":"Start digitalized your logsheet with Digital.Logsheet","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/logsheet.digital\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/a56aab2ea92bcba9a8628fd04416a4de","name":"Sinthia Dwi Yolandasari","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/logsheet.digital\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a48b833a67f6268712910d76a7a0ab259f9e70ef3cd6ce69e0bbb718e1eeefd4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a48b833a67f6268712910d76a7a0ab259f9e70ef3cd6ce69e0bbb718e1eeefd4?s=96&d=mm&r=g","caption":"Sinthia Dwi Yolandasari"},"url":"https:\/\/logsheet.digital\/blog\/author\/sinthia\/"}]}},"_links":{"self":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/3945","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/comments?post=3945"}],"version-history":[{"count":1,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/3945\/revisions"}],"predecessor-version":[{"id":3946,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/posts\/3945\/revisions\/3946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/media\/3502"}],"wp:attachment":[{"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/media?parent=3945"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/categories?post=3945"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logsheet.digital\/blog\/wp-json\/wp\/v2\/tags?post=3945"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}