{"id":41014,"date":"2025-06-25T08:28:01","date_gmt":"2025-06-24T22:28:01","guid":{"rendered":"https:\/\/www.bitemagazine.com.au\/?p=41014"},"modified":"2025-06-25T08:28:01","modified_gmt":"2025-06-24T22:28:01","slug":"defence-in-depth-a-comprehensive-approach-to-securing-patient-data","status":"publish","type":"post","link":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/","title":{"rendered":"Defence in Depth: A Comprehensive Approach to Securing Patient Data"},"content":{"rendered":"\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\" alt=\"securing patient data\" class=\"wp-image-41015 lazyload\" data-srcset=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg 1024w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-300x200.jpg 300w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-768x512.jpg 768w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-630x420.jpg 630w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-150x100.jpg 150w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-600x400.jpg 600w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-696x464.jpg 696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><noscript><img decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\" alt=\"securing patient data\" class=\"wp-image-41015 lazyload\" srcset=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg 1024w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-300x200.jpg 300w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-768x512.jpg 768w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-630x420.jpg 630w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-150x100.jpg 150w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-600x400.jpg 600w, https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT-696x464.jpg 696w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/noscript><\/figure>\n\n\n\n<p><em>This article is sponsored content brought to you by Mercury IT.<\/em><\/p>\n\n\n\n<p>In today\u2019s digital age, the security of patient data is of paramount importance for Dental Practices. With the increasing reliance on electronic health records and online communication, safeguarding sensitive information has become a critical concern. Dental Practice owners must adopt a defence in depth strategy to protect patient data from potential threats.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-endpoint-detection-and-response-the-first-layer-of-defence\">Endpoint Detection and Response: The First Layer of Defence<\/h3>\n\n\n\n<p>Endpoint Detection and Response (EDR) is essential for securing devices such as computers, tablets, and smartphones used in Dental Practices. By implementing advanced EDR solutions, Dental Practices can prevent unauthorised access, malware infections, and data breaches. These solutions offer real-time monitoring, threat detection, and automated response capabilities, ensuring that patient data remains secure.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-email-protection-securing-communication-channels\">Email Protection: Securing Communication Channels<\/h3>\n\n\n\n<p>Email remains one of the primary vectors for cybercriminals to gain access to systems through phishing and targeted attacks. Advanced email security solutions can effectively reduce the risk of emailed malware and spam, reducing the risk of cyberattacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-dns-protection-safeguarding-online-communication\">DNS Protection: Safeguarding Online Communication<\/h3>\n\n\n\n<p>DNS protection is crucial for Dental Practices that rely on online communication and services. By securing the Domain Name System (DNS), Dental Practices can prevent cyberattacks such as phishing, malware distribution, and unauthorised access to sensitive information. DNS protection ensures that patient data remains safe during online interactions, providing peace of mind for both dental professionals and their patients.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-ongoing-cybersecurity-training-and-phishing-simulations-building-a-culture-of-security\">Ongoing Cybersecurity Training and Phishing Simulations: Building a Culture of Security<\/h3>\n\n\n\n<p>Ongoing cybersecurity training and phishing simulations are essential for Dental Practices to stay ahead of evolving threats. Regular training sessions help dental professionals understand the latest cybersecurity best practices and recognise potential threats. Phishing simulations provide practical experience in identifying and responding to phishing attacks, reducing the risk of successful breaches. By fostering a culture of security awareness, Dental Practices can ensure that all staff members are equipped to protect patient data effectively.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-security-operations-centre-proactive-monitoring-and-response\">Security Operations Centre: Proactive Monitoring and Response<\/h3>\n\n\n\n<p>A Security Operations Centre (SOC) plays a vital role in maintaining the security of Dental Practices. The SOC provides continuous monitoring of network activities, identifying and responding to potential threats before they can cause harm. With a dedicated team of cybersecurity experts, Dental Practices can benefit from proactive threat management and rapid incident response, minimising the risk of data breaches.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\" id=\"h-conclusion\">Conclusion<\/h3>\n\n\n\n<p>Defence in depth is a comprehensive approach to securing patient data for Dental Practice owners in the digital age. By implementing Endpoint Detection and Response, email protection, DNS protection, conducting ongoing cybersecurity training and phishing simulations, and utilising a Security Operations Centre, Dental Practices can protect sensitive information and maintain the trust of their patients. Investing in robust cybersecurity measures is not just a necessity but a commitment to providing the highest level of care and security.&nbsp;<\/p>\n\n\n\n<p><strong>Visit <a href=\"https:\/\/mercuryit.com.au\" target=\"_blank\" rel=\"noreferrer noopener\">Mercury IT<\/a><\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>This article is sponsored content brought to you by Mercury IT. In today\u2019s digital age, the security of patient data is of paramount importance for Dental Practices. With the increasing reliance on electronic health records and online communication, safeguarding sensitive information has become a critical concern. Dental Practice owners must adopt a defence in depth [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":41015,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[25690],"tags":[22687,25532,22189,25711],"class_list":{"0":"post-41014","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-dental-i-t","8":"tag-cybersecurity","9":"tag-data-breach","10":"tag-electronic-dental-records","11":"tag-mercury-it"},"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.9 (Yoast SEO v25.9) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Defence in Depth: A Comprehensive Approach to Securing Patient Data - Bite Magazine<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Defence in Depth: A Comprehensive Approach to Securing Patient Data\" \/>\n<meta property=\"og:description\" content=\"This article is sponsored content brought to you by Mercury IT. In today\u2019s digital age, the security of patient data is of paramount importance for Dental Practices. With the increasing reliance on electronic health records and online communication, safeguarding sensitive information has become a critical concern. Dental Practice owners must adopt a defence in depth [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Bite Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Bite.Mag\" \/>\n<meta property=\"article:published_time\" content=\"2025-06-24T22:28:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Advertorial\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Advertorial\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\"},\"author\":{\"name\":\"Advertorial\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/03ee9ce1c4b4b02092342f877acfc02d\"},\"headline\":\"Defence in Depth: A Comprehensive Approach to Securing Patient Data\",\"datePublished\":\"2025-06-24T22:28:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\"},\"wordCount\":476,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\",\"keywords\":[\"cybersecurity\",\"data breach\",\"electronic dental records\",\"Mercury IT\"],\"articleSection\":[\"Dental I.T.\"],\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\",\"url\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\",\"name\":\"Defence in Depth: A Comprehensive Approach to Securing Patient Data - Bite Magazine\",\"isPartOf\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\",\"datePublished\":\"2025-06-24T22:28:01+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage\",\"url\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\",\"contentUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg\",\"width\":1024,\"height\":683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.bitemagazine.com.au\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Defence in Depth: A Comprehensive Approach to Securing Patient Data\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#website\",\"url\":\"https:\/\/www.bitemagazine.com.au\/\",\"name\":\"Bite Magazine\",\"description\":\"Independent dental news, views and reviews\",\"publisher\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bitemagazine.com.au\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#organization\",\"name\":\"Bite Magazine\",\"url\":\"https:\/\/www.bitemagazine.com.au\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg\",\"contentUrl\":\"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg\",\"width\":200,\"height\":148,\"caption\":\"Bite Magazine\"},\"image\":{\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Bite.Mag\",\"https:\/\/x.com\/bitemag\",\"http:\/\/www.linkedin.com\/company\/bite-magazine\",\"http:\/\/www.pinterest.com\/bitemag\",\"http:\/\/youtube.com\/c\/BitemagazineAu\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/03ee9ce1c4b4b02092342f877acfc02d\",\"name\":\"Advertorial\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b3b8e0717db8f480cc4e289955e656e6aeb893705725023530e0f02717085ee?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b3b8e0717db8f480cc4e289955e656e6aeb893705725023530e0f02717085ee?s=96&d=mm&r=g\",\"caption\":\"Advertorial\"},\"url\":\"https:\/\/www.bitemagazine.com.au\/author\/advertorial\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Defence in Depth: A Comprehensive Approach to Securing Patient Data - Bite Magazine","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/","og_locale":"en_US","og_type":"article","og_title":"Defence in Depth: A Comprehensive Approach to Securing Patient Data","og_description":"This article is sponsored content brought to you by Mercury IT. In today\u2019s digital age, the security of patient data is of paramount importance for Dental Practices. With the increasing reliance on electronic health records and online communication, safeguarding sensitive information has become a critical concern. Dental Practice owners must adopt a defence in depth [&hellip;]","og_url":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/","og_site_name":"Bite Magazine","article_publisher":"https:\/\/www.facebook.com\/Bite.Mag","article_published_time":"2025-06-24T22:28:01+00:00","og_image":[{"width":1024,"height":683,"url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg","type":"image\/jpeg"}],"author":"Advertorial","twitter_misc":{"Written by":"Advertorial","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#article","isPartOf":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/"},"author":{"name":"Advertorial","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/03ee9ce1c4b4b02092342f877acfc02d"},"headline":"Defence in Depth: A Comprehensive Approach to Securing Patient Data","datePublished":"2025-06-24T22:28:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/"},"wordCount":476,"commentCount":0,"publisher":{"@id":"https:\/\/www.bitemagazine.com.au\/#organization"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg","keywords":["cybersecurity","data breach","electronic dental records","Mercury IT"],"articleSection":["Dental I.T."],"inLanguage":"en-AU","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/","url":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/","name":"Defence in Depth: A Comprehensive Approach to Securing Patient Data - Bite Magazine","isPartOf":{"@id":"https:\/\/www.bitemagazine.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg","datePublished":"2025-06-24T22:28:01+00:00","breadcrumb":{"@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#primaryimage","url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg","contentUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2025\/06\/mercuryIT.jpg","width":1024,"height":683},{"@type":"BreadcrumbList","@id":"https:\/\/www.bitemagazine.com.au\/defence-in-depth-a-comprehensive-approach-to-securing-patient-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.bitemagazine.com.au\/"},{"@type":"ListItem","position":2,"name":"Defence in Depth: A Comprehensive Approach to Securing Patient Data"}]},{"@type":"WebSite","@id":"https:\/\/www.bitemagazine.com.au\/#website","url":"https:\/\/www.bitemagazine.com.au\/","name":"Bite Magazine","description":"Independent dental news, views and reviews","publisher":{"@id":"https:\/\/www.bitemagazine.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bitemagazine.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Organization","@id":"https:\/\/www.bitemagazine.com.au\/#organization","name":"Bite Magazine","url":"https:\/\/www.bitemagazine.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg","contentUrl":"https:\/\/www.bitemagazine.com.au\/wp-content\/uploads\/2018\/08\/BiteLogo2018_signature.jpg","width":200,"height":148,"caption":"Bite Magazine"},"image":{"@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Bite.Mag","https:\/\/x.com\/bitemag","http:\/\/www.linkedin.com\/company\/bite-magazine","http:\/\/www.pinterest.com\/bitemag","http:\/\/youtube.com\/c\/BitemagazineAu"]},{"@type":"Person","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/03ee9ce1c4b4b02092342f877acfc02d","name":"Advertorial","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.bitemagazine.com.au\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b3b8e0717db8f480cc4e289955e656e6aeb893705725023530e0f02717085ee?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b3b8e0717db8f480cc4e289955e656e6aeb893705725023530e0f02717085ee?s=96&d=mm&r=g","caption":"Advertorial"},"url":"https:\/\/www.bitemagazine.com.au\/author\/advertorial\/"}]}},"_links":{"self":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts\/41014","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/comments?post=41014"}],"version-history":[{"count":0,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/posts\/41014\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/media\/41015"}],"wp:attachment":[{"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/media?parent=41014"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/categories?post=41014"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bitemagazine.com.au\/wp-json\/wp\/v2\/tags?post=41014"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}