{"id":2471,"date":"2025-06-19T16:34:41","date_gmt":"2025-06-19T14:34:41","guid":{"rendered":"https:\/\/wedodis.co.za\/news\/?p=2471"},"modified":"2025-06-19T16:34:41","modified_gmt":"2025-06-19T14:34:41","slug":"business-email-compromise-preventing-workflow-vulnerabilities","status":"publish","type":"post","link":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/","title":{"rendered":"Business Email Compromise: Preventing Workflow Vulnerabilities"},"content":{"rendered":"<h4>Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business<\/h4>\n<p><\/p>\n<p>On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the growing threat of Business Email Compromise (BEC) during a discussion on workflow vulnerabilities. With 38% of South African executives ranking BEC as a top cyber threat due to over seven million phishing attempts in 2023, organizations must assess email security processes, particularly in high-value transactions, to protect against fraud.<\/p>\n<p><\/p>\n<h2>Identifying Workflow Vulnerabilities in High-Value Transactions<\/h2>\n<p>Business Email Compromise (BEC) exploits vulnerabilities in email-dependent workflows, notably in high-value transactions where identity verification often remains inadequate. Bobby Stewart states, &#8220;BEC exploits weaknesses in workflow.&#8221;<\/p>\n<p>A notable incident involved a homeowner mistakenly signing bond-cancellation documents due to unverified communications. Stewart noted, &#8220;Such an attack occurs not because of firewalls or strong passwords.&#8221;<\/p>\n<p>Traditional security measures cannot fully protect organizations; they&#8217;ll only succeed if integrated into transaction workflows. As Stewart emphasized, &#8220;most BEC vulnerabilities are mitigated&#8221; when safeguards are constructed into communication methods.<\/p>\n<p>Effective collaboration between multiple parties in significant transactions remains a critical challenge. Security protocols must encompass every stakeholder to minimize exposure to BEC.<\/p>\n<h2>Best Practices to Mitigate Business Email Compromise Risks<\/h2>\n<p>Creating a secure, authenticated environment for all parties involved is an essential strategy in mitigating BEC risks. Stewart underscores that secure communication allows entities to transfer sensitive information away from unprotected channels.<\/p>\n<p>Integrating end-to-end encryption offers a layer of protection, safeguarding document sharing among participants in high-value transactions. This minimizes the risk of impersonation and fraudulent activities, according to Stewart.<\/p>\n<p>Organizations must reevaluate their communication processes, diagram each transaction step, and redesign workflows. Stewart suggests identifying steps still relying on unprotected methods to bolster defenses against BEC.<\/p>\n<p><\/p>\n<hr>\n<p><\/p>\n<p>In conclusion, as Business Email Compromise continues to pose significant threats to organizations, especially in high-stakes transactions, it is imperative that businesses adopt a proactive approach to mitigate vulnerabilities. By embedding secure, authenticated processes and re-evaluating communication workflows, companies can transform potential weaknesses into resilient defenses against cyber fraud.<\/p>\n<p><\/p>\n<hr>\n<p><strong>Let us know your thoughts by leaving a comment below!<\/strong><br \/>\nDon&rsquo;t forget to share this article with others who may find it helpful.<\/p>\n<hr>\n<p><\/p>\n<div id=\"wedod-2458469668\" class=\"wedod-after-content wedod-entity-placement\"><script async src=\"\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-1458300956780583\" crossorigin=\"anonymous\"><\/script><ins class=\"adsbygoogle\" style=\"display:block;\" data-ad-client=\"ca-pub-1458300956780583\" \ndata-ad-slot=\"\" \ndata-ad-format=\"auto\"><\/ins>\n<script> \n(adsbygoogle = window.adsbygoogle || []).push({}); \n<\/script>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business<\/p>\n<p>On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the growing threat of Business Email Compromise (BEC) during a discussion on workflow vulnerabilities.With 38% of South African executives ranking BEC as a top cyber threat due to over seven million phishing attempts in 2023, organizations must assess email security processes, particularly in high-value transactions, to protect against fraud.<\/p>\n","protected":false},"author":3,"featured_media":2472,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2}},"categories":[414],"tags":[3521,3523,3524,3525,3522,3526],"class_list":["post-2471","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tech","tag-business-email-compromise","tag-cybersecurity-best-practices","tag-email-fraud-prevention","tag-high-value-transaction-security","tag-how-to-prevent-bec","tag-identity-verification-methods"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Business Email Compromise: Preventing Workflow Vulnerabilities<\/title>\n<meta name=\"description\" content=\"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Business Email Compromise: Preventing Workflow Vulnerabilities\" \/>\n<meta property=\"og:description\" content=\"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/\" \/>\n<meta property=\"og:site_name\" content=\"We Do Dis News\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Wedodis.co.za\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-19T14:34:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1434\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/webp\" \/>\n<meta name=\"author\" content=\"wedodis\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Man_Gale\" \/>\n<meta name=\"twitter:site\" content=\"@Man_Gale\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"wedodis\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/\"},\"author\":{\"name\":\"wedodis\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#\\\/schema\\\/person\\\/85fb222d9740dffbaf6d4ee9de30f2f7\"},\"headline\":\"Business Email Compromise: Preventing Workflow Vulnerabilities\",\"datePublished\":\"2025-06-19T14:34:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/\"},\"wordCount\":357,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/image_40BTMQYA6E.webp\",\"keywords\":[\"Business Email Compromise\",\"cybersecurity best practices\",\"email fraud prevention\",\"high-value transaction security\",\"how to prevent BEC\",\"identity verification methods\"],\"articleSection\":[\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/\",\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/\",\"name\":\"Business Email Compromise: Preventing Workflow Vulnerabilities\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/image_40BTMQYA6E.webp\",\"datePublished\":\"2025-06-19T14:34:41+00:00\",\"description\":\"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#primaryimage\",\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/image_40BTMQYA6E.webp\",\"contentUrl\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2025\\\/06\\\/image_40BTMQYA6E.webp\",\"width\":2048,\"height\":1434},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/business-email-compromise-preventing-workflow-vulnerabilities\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tech\",\"item\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/category\\\/tech\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Business Email Compromise: Preventing Workflow Vulnerabilities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#website\",\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/\",\"name\":\"We Do Dis News\",\"description\":\"Discover World Top News\",\"publisher\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#organization\"},\"alternateName\":\"wddn\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#organization\",\"name\":\"We Do Dis News\",\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/cropped-W-1-1.png\",\"contentUrl\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/wp-content\\\/uploads\\\/2024\\\/02\\\/cropped-W-1-1.png\",\"width\":271,\"height\":148,\"caption\":\"We Do Dis News\"},\"image\":{\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/Wedodis.co.za\",\"https:\\\/\\\/x.com\\\/Man_Gale\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/lufuno-mangale-b9b37790\",\"https:\\\/\\\/wa.me\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/#\\\/schema\\\/person\\\/85fb222d9740dffbaf6d4ee9de30f2f7\",\"name\":\"wedodis\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g\",\"caption\":\"wedodis\"},\"url\":\"https:\\\/\\\/wedodis.co.za\\\/news\\\/author\\\/wedodis\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Business Email Compromise: Preventing Workflow Vulnerabilities","description":"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/","og_locale":"en_US","og_type":"article","og_title":"Business Email Compromise: Preventing Workflow Vulnerabilities","og_description":"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the","og_url":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/","og_site_name":"We Do Dis News","article_publisher":"https:\/\/www.facebook.com\/Wedodis.co.za","article_published_time":"2025-06-19T14:34:41+00:00","og_image":[{"width":2048,"height":1434,"url":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","type":"image\/webp"}],"author":"wedodis","twitter_card":"summary_large_image","twitter_creator":"@Man_Gale","twitter_site":"@Man_Gale","twitter_misc":{"Written by":"wedodis","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#article","isPartOf":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/"},"author":{"name":"wedodis","@id":"https:\/\/wedodis.co.za\/news\/#\/schema\/person\/85fb222d9740dffbaf6d4ee9de30f2f7"},"headline":"Business Email Compromise: Preventing Workflow Vulnerabilities","datePublished":"2025-06-19T14:34:41+00:00","mainEntityOfPage":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/"},"wordCount":357,"commentCount":0,"publisher":{"@id":"https:\/\/wedodis.co.za\/news\/#organization"},"image":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","keywords":["Business Email Compromise","cybersecurity best practices","email fraud prevention","high-value transaction security","how to prevent BEC","identity verification methods"],"articleSection":["Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/","url":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/","name":"Business Email Compromise: Preventing Workflow Vulnerabilities","isPartOf":{"@id":"https:\/\/wedodis.co.za\/news\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#primaryimage"},"image":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#primaryimage"},"thumbnailUrl":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","datePublished":"2025-06-19T14:34:41+00:00","description":"Combatting Business Email Compromise: Strengthen Workflow to Protect Your Business On June 18, 2025, Bobby Stewart, a product owner at e4, highlights the","breadcrumb":{"@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#primaryimage","url":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","contentUrl":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","width":2048,"height":1434},{"@type":"BreadcrumbList","@id":"https:\/\/wedodis.co.za\/news\/business-email-compromise-preventing-workflow-vulnerabilities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wedodis.co.za\/news\/"},{"@type":"ListItem","position":2,"name":"Tech","item":"https:\/\/wedodis.co.za\/news\/category\/tech\/"},{"@type":"ListItem","position":3,"name":"Business Email Compromise: Preventing Workflow Vulnerabilities"}]},{"@type":"WebSite","@id":"https:\/\/wedodis.co.za\/news\/#website","url":"https:\/\/wedodis.co.za\/news\/","name":"We Do Dis News","description":"Discover World Top News","publisher":{"@id":"https:\/\/wedodis.co.za\/news\/#organization"},"alternateName":"wddn","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wedodis.co.za\/news\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/wedodis.co.za\/news\/#organization","name":"We Do Dis News","url":"https:\/\/wedodis.co.za\/news\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wedodis.co.za\/news\/#\/schema\/logo\/image\/","url":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2024\/02\/cropped-W-1-1.png","contentUrl":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2024\/02\/cropped-W-1-1.png","width":271,"height":148,"caption":"We Do Dis News"},"image":{"@id":"https:\/\/wedodis.co.za\/news\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Wedodis.co.za","https:\/\/x.com\/Man_Gale","https:\/\/www.linkedin.com\/in\/lufuno-mangale-b9b37790","https:\/\/wa.me\/"]},{"@type":"Person","@id":"https:\/\/wedodis.co.za\/news\/#\/schema\/person\/85fb222d9740dffbaf6d4ee9de30f2f7","name":"wedodis","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15be78f53145da9df0e569a04d0738dd79a76b5d77250da995f2df994cae6efe?s=96&d=mm&r=g","caption":"wedodis"},"url":"https:\/\/wedodis.co.za\/news\/author\/wedodis\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/wedodis.co.za\/news\/wp-content\/uploads\/2025\/06\/image_40BTMQYA6E.webp","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/posts\/2471","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/comments?post=2471"}],"version-history":[{"count":1,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/posts\/2471\/revisions"}],"predecessor-version":[{"id":2496,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/posts\/2471\/revisions\/2496"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/media\/2472"}],"wp:attachment":[{"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/media?parent=2471"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/categories?post=2471"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wedodis.co.za\/news\/wp-json\/wp\/v2\/tags?post=2471"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}