{"id":72153,"date":"2025-08-20T13:00:00","date_gmt":"2025-08-20T17:00:00","guid":{"rendered":"https:\/\/statescoop.com\/?p=72153"},"modified":"2025-08-19T10:55:40","modified_gmt":"2025-08-19T14:55:40","slug":"why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses","status":"publish","type":"post","link":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","title":{"rendered":"Why hackers are targeting agency help desks and key employees to bypass cyber defenses"},"content":{"rendered":"\n<p>Government agencies have spent billions building digital fortresses. A new generation of threat actors, however, is circumventing those investments by exploiting the most persistent vulnerability: agency employees.<\/p>\n\n\n\n<p>According to a <a href=\"https:\/\/cdn.statescoop.com\/hacking-humans.pdf\">new report from Scoop News Group and Proofpoint<\/a>, attackers are bypassing agencies\u2019 technical defenses by targeting employees directly through sophisticated social engineering. What\u2019s causing growing concern: Agency help desks have emerged as a &#8220;high-value target.&#8221;<\/p>\n\n\n\n<p>The report, &#8220;<a href=\"https:\/\/cdn.statescoop.com\/hacking-humans.pdf\">Hacking Humans: How to Defend Against Your Biggest Cyber Risk,<\/a>&#8221; argues that traditional security measures are increasingly ineffective against attackers who use deception and impersonation to penetrate agency IT systems. That\u2019s prompting agency officials to adopt a &#8220;human-centric&#8221; defense strategy, acknowledging that people are now the primary battleground for protecting sensitive government data and services.<\/p>\n\n\n\n<figure class=\"wp-block-image alignleft size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" width=\"776\" height=\"966\" src=\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png\" alt=\"\" class=\"wp-image-72183\" style=\"width:295px;height:auto\" srcset=\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png 776w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=241,300 241w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=768,956 768w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=482,600 482w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=135,168 135w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=271,337 271w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=542,675 542w, https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Screenshot-2025-08-04-at-11.46.22-AM.png?resize=677,843 677w\" sizes=\"auto, (max-width: 776px) 100vw, 776px\" \/><figcaption class=\"wp-element-caption\">Download the <a href=\"https:\/\/cdn.statescoop.com\/hacking-humans.pdf\">full report<\/a>.<\/figcaption><\/figure>\n\n\n\n<p>The threat is no longer limited to generic phishing emails. Attackers now conduct detailed reconnaissance on employees, using information from data breaches and social media to craft highly convincing impersonations. The report details an instance where a threat actor, posing as an oncologist, nearly tricked a help desk specialist at a health institution into resetting a caller\u2019s credentials. The attempt failed because the specialist was savvy enough to sense something was amiss about the call. That level of intuition, the report warns, is not scalable across an entire workforce.<\/p>\n\n\n\n<p>The stakes are immense for government agencies, which safeguard vast amounts of personally identifiable information (PII), classified documents, and critical infrastructure data. The report notes that traditional verification methods, like asking for the last four digits of a Social Security number or a mother&#8217;s maiden name, are now &#8220;dangerously obsolete&#8221; due to the widespread availability of this information on the dark web. The rise of AI-powered deepfakes further complicates verification, making it possible to spoof a person\u2019s voice and likeness in real-time.<\/p>\n\n\n\n<p>The report notes that service desk agents have become especially high-profile targets. Once an attacker successfully impersonates an employee and cons a help desk agent into providing new credentials, it\u2019s often just a matter of clicks before a hacker gains the legitimate tools needed to escalate privileges, move laterally across networks, exfiltrate data, or deploy ransomware.<\/p>\n\n\n\n<p><strong>Defending against human-centered attacks.<\/strong><\/p>\n\n\n\n<p>The report highlights several factors driving the shift in cyberattacks, steps agencies should consider to realign their cybersecurity strategies, and examples of government agencies and institutions that reduced their risks utilizing human-centric defense strategies. The report argues:<\/p>\n\n\n\n<ol start=\"1\" class=\"wp-block-list\">\n<li><strong>The primary threat vector has shifted to people, not systems.<\/strong> Technical defenses like firewalls are still essential, but attackers are actively circumventing them. The report finds that social engineering is the dominant tactic, with 60% of data breaches involving a human exploitation. Help desks, which hold the power to reset passwords and manage multi-factor authentication (MFA), have become a focal point for these attacks because they offer a direct path to high-level access. \u201cA service desk agent can change a password, reset credentials, manage multi-factor authentication (MFA) devices, and troubleshoot access issues,\u201d says Pablo Passera, vice president of product management at Proofpoint. \u201cSo, the service desk is a very valuable target for threat actors right now.\u201d<\/li>\n\n\n\n<li><strong>Current training and technology are insufficient for this new threat.<\/strong> The report stresses that most employees, including specialized help desk staff, are not adequately equipped to identify and thwart these sophisticated impersonation attempts at scale. This capability gap represents a critical failure point for agency security. \u201cNot all help desk individuals have that sixth sense or have the level of training needed to thwart attacks,\u201d states Ryan Witt, vice president of industry solutions at Proofpoint. \u201cNor do they have the level of technology and authentication capability built into their infrastructure right now to stop these types of attacks at scale.\u201d<\/li>\n\n\n\n<li><strong>A &#8220;human-centric&#8221; defense must complement technical defenses. <\/strong>To counter these threats, agencies must move beyond a purely technical mindset. The report recommends a layered, human-focused strategy that includes: assessing which employees are most at risk (e.g., public-facing or highly privileged users); implementing specialized, practical training for help desk staff; deploying advanced analytics to monitor for anomalous user behavior; and re-evaluating identity verification processes to be more resilient against deepfakes and PII exposure. The core of this strategy is to understand and protect the human layer as the first and last line of defense.<\/li>\n<\/ol>\n\n\n\n<p>The report concludes that the challenge for agencies is implementing human-centric defenses at scale. To address that challenge, it highlights advanced solutions from Proofpoint, a \u201cLeader\u201d in Gartner\u2019s 2024 Magic Quadrant for email security platforms, designed to intercept and remediate malicious emails and related threats before employees become victims.<\/p>\n\n\n\n<p><em><a href=\"https:\/\/cdn.statescoop.com\/hacking-humans.pdf\">Download the full report<\/a>.<\/em><\/p>\n\n\n\n<p><em>The article was produced by Scoop News Group for StateScoop and sponsored by Proofpoint.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A new report describes how social engineering and targeted impersonation are making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.<\/p>\n","protected":false},"author":237,"featured_media":72182,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"disable_grayscale_images":true,"grayscale_contrast":0,"sponsored_content":true,"display_author_bio":true,"story_type":"","footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"enabled":false},"version":2}},"categories":[4835,23780],"tags":[383,1562,2851,4269,5265,5270,16536,23625,24478,25764,25765,25766],"people":[],"special-report":[],"authors":[23938],"class_list":["post-72153","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-sponsored-content","category-insights","tag-sponsored-content","tag-training","tag-hacking","tag-gartner","tag-special-report","tag-workforce","tag-cybersecurity","tag-proofpoint","tag-princeton-university","tag-proofpoint-2025","tag-impersonation","tag-cyber-attacks","author-scoop-news-group"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v24.5 (Yoast SEO v24.5) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop<\/title>\n<meta name=\"description\" content=\"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop\" \/>\n<meta property=\"og:description\" content=\"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/\" \/>\n<meta property=\"og:site_name\" content=\"StateScoop\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/StateScoop\/\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-20T17:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Wyatt Kash\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png\" \/>\n<meta name=\"twitter:creator\" content=\"@State_Scoop\" \/>\n<meta name=\"twitter:site\" content=\"@State_Scoop\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/\",\"url\":\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/\",\"name\":\"Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop\",\"isPartOf\":{\"@id\":\"https:\/\/statescoop.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png\",\"datePublished\":\"2025-08-20T17:00:00+00:00\",\"description\":\"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage\",\"url\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png\",\"contentUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png\",\"width\":8000,\"height\":4500,\"caption\":\"Getty Images\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/statescoop.com\/#website\",\"url\":\"https:\/\/statescoop.com\/\",\"name\":\"StateScoop\",\"description\":\"Latest news and events in state and local government technology\",\"publisher\":{\"@id\":\"https:\/\/statescoop.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/statescoop.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/statescoop.com\/#organization\",\"name\":\"StateScoop\",\"url\":\"https:\/\/statescoop.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/statescoop.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png\",\"contentUrl\":\"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png\",\"width\":1470,\"height\":186,\"caption\":\"StateScoop\"},\"image\":{\"@id\":\"https:\/\/statescoop.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/StateScoop\/\",\"https:\/\/x.com\/State_Scoop\",\"https:\/\/www.linkedin.com\/company\/statescoop\/\",\"https:\/\/www.youtube.com\/@StateScoop\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop","description":"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","og_locale":"en_US","og_type":"article","og_title":"Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop","og_description":"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.","og_url":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","og_site_name":"StateScoop","article_publisher":"https:\/\/www.facebook.com\/StateScoop\/","article_published_time":"2025-08-20T17:00:00+00:00","author":"Wyatt Kash","twitter_card":"summary_large_image","twitter_image":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png","twitter_creator":"@State_Scoop","twitter_site":"@State_Scoop","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","url":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","name":"Why hackers are targeting agency help desks and key employees to bypass cyber defenses | StateScoop","isPartOf":{"@id":"https:\/\/statescoop.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage"},"image":{"@id":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage"},"thumbnailUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png","datePublished":"2025-08-20T17:00:00+00:00","description":"A new report describes how social engineering is making traditional security strategies obsolete \u2014 and the steps state and local agencies should take to confront the new age of human hacking.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/#primaryimage","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png","contentUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png","width":8000,"height":4500,"caption":"Getty Images"},{"@type":"WebSite","@id":"https:\/\/statescoop.com\/#website","url":"https:\/\/statescoop.com\/","name":"StateScoop","description":"Latest news and events in state and local government technology","publisher":{"@id":"https:\/\/statescoop.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/statescoop.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/statescoop.com\/#organization","name":"StateScoop","url":"https:\/\/statescoop.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/statescoop.com\/#\/schema\/logo\/image\/","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png","contentUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/StateScoop-Black.png","width":1470,"height":186,"caption":"StateScoop"},"image":{"@id":"https:\/\/statescoop.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/StateScoop\/","https:\/\/x.com\/State_Scoop","https:\/\/www.linkedin.com\/company\/statescoop\/","https:\/\/www.youtube.com\/@StateScoop"]}]}},"parsely":{"version":"1.1.0","canonical_url":"https:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","smart_links":{"inbound":0,"outbound":0},"traffic_boost_suggestions_count":0,"meta":{"@context":"https:\/\/schema.org","@type":"NewsArticle","headline":"Why hackers are targeting agency help desks and key employees to bypass cyber defenses","url":"http:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/","mainEntityOfPage":{"@type":"WebPage","@id":"http:\/\/statescoop.com\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\/"},"thumbnailUrl":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png?w=150&h=150&crop=1","image":{"@type":"ImageObject","url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png"},"articleSection":"Sponsored Content","author":[{"@type":"Person","name":"Scoop News Group","url":"https:\/\/statescoop.com\/author\/scoop-news-group\/"}],"creator":["Scoop News Group"],"publisher":{"@type":"Organization","name":"StateScoop","logo":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2023\/01\/cropped-ss_favicon.png"},"keywords":["cyber attacks","cybersecurity","gartner","hacking","impersonation","princeton university","proofpoint","proofpoint 2025","special report","sponsored content","training","workforce"],"dateCreated":"2025-08-20T17:00:00Z","datePublished":"2025-08-20T17:00:00Z","dateModified":"2025-08-20T17:00:00Z"},"rendered":"<script type=\"application\/ld+json\" class=\"wp-parsely-metadata\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@type\":\"NewsArticle\",\"headline\":\"Why hackers are targeting agency help desks and key employees to bypass cyber defenses\",\"url\":\"http:\\\/\\\/statescoop.com\\\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\\\/\",\"mainEntityOfPage\":{\"@type\":\"WebPage\",\"@id\":\"http:\\\/\\\/statescoop.com\\\/why-hackers-are-targeting-agency-help-desks-to-bypass-cyber-defenses\\\/\"},\"thumbnailUrl\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/08\\\/Report-Header.png?w=150&h=150&crop=1\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2025\\\/08\\\/Report-Header.png\"},\"articleSection\":\"Sponsored Content\",\"author\":[{\"@type\":\"Person\",\"name\":\"Scoop News Group\",\"url\":\"https:\\\/\\\/statescoop.com\\\/author\\\/scoop-news-group\\\/\"}],\"creator\":[\"Scoop News Group\"],\"publisher\":{\"@type\":\"Organization\",\"name\":\"StateScoop\",\"logo\":\"https:\\\/\\\/statescoop.com\\\/wp-content\\\/uploads\\\/sites\\\/6\\\/2023\\\/01\\\/cropped-ss_favicon.png\"},\"keywords\":[\"cyber attacks\",\"cybersecurity\",\"gartner\",\"hacking\",\"impersonation\",\"princeton university\",\"proofpoint\",\"proofpoint 2025\",\"special report\",\"sponsored content\",\"training\",\"workforce\"],\"dateCreated\":\"2025-08-20T17:00:00Z\",\"datePublished\":\"2025-08-20T17:00:00Z\",\"dateModified\":\"2025-08-20T17:00:00Z\"}<\/script>","tracker_url":"https:\/\/cdn.parsely.com\/keys\/statescoop.com\/p.js"},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/statescoop.com\/wp-content\/uploads\/sites\/6\/2025\/08\/Report-Header.png","distributor_meta":false,"distributor_terms":false,"distributor_media":false,"distributor_original_site_name":"StateScoop","distributor_original_site_url":"https:\/\/statescoop.com","push-errors":false,"_links":{"self":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72153","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/users\/237"}],"replies":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/comments?post=72153"}],"version-history":[{"count":5,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72153\/revisions"}],"predecessor-version":[{"id":72429,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/posts\/72153\/revisions\/72429"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/media\/72182"}],"wp:attachment":[{"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/media?parent=72153"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/categories?post=72153"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/tags?post=72153"},{"taxonomy":"people","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/people?post=72153"},{"taxonomy":"special-report","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/special-report?post=72153"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/statescoop.com\/wp-json\/wp\/v2\/authors?post=72153"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}