{"id":95021,"date":"2024-11-13T08:33:12","date_gmt":"2024-11-13T08:33:12","guid":{"rendered":"https:\/\/expleo.com\/global\/en\/?post_type=insights&#038;p=95021"},"modified":"2025-07-15T14:04:55","modified_gmt":"2025-07-15T14:04:55","slug":"guarding-grid-cybersecurity-smart-grids","status":"publish","type":"insights","link":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/","title":{"rendered":"Guarding the grid: essential cybersecurity measures for smart grids\u00a0\u00a0"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"95021\" class=\"elementor elementor-95021\" data-elementor-post-type=\"insights\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-4c4c219 gg-article-content gg-standard-article-template gg-simple-text gg-container-tiny elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"4c4c219\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-aa71ba7\" data-id=\"aa71ba7\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-82b1298 elementor-widget elementor-widget-spacer\" data-id=\"82b1298\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-e697946 elementor-section-content-top elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"e697946\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-no\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-d479b2c\" data-id=\"d479b2c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-fdf2a19 elementor-widget elementor-widget-image\" data-id=\"fdf2a19\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"500\" height=\"500\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/11\/stephen_magennis.jpg\" class=\"attachment-large size-large wp-image-95400\" alt=\"A person with brown hair is wearing a suit and tie, standing in front of a blurred blue background with white text.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/11\/stephen_magennis.jpg 500w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/11\/stephen_magennis-300x300.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/11\/stephen_magennis-150x150.jpg 150w\" sizes=\"(max-width: 500px) 100vw, 500px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-50 elementor-inner-column elementor-element elementor-element-83aa575\" data-id=\"83aa575\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-7535bc1 elementor-widget elementor-widget-text-editor\" data-id=\"7535bc1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"auto\">To<\/span><span data-contrast=\"none\"> combat climate change, it is crucial to enhance energy efficiency and reduce carbon emissions worldwide. As the <\/span><a href=\"https:\/\/www.iea.org\/reports\/electricity-2024\/executive-summary\" target=\"_blank\" rel=\"noopener\"><span data-contrast=\"none\">global demand for electricity is increasing by 3.4% annually<\/span><\/a><span data-contrast=\"none\">,<\/span> <span data-contrast=\"none\">a larger portion of our electricity must be sourced from renewable energy sources.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-0b03c4f elementor-widget elementor-widget-text-editor\" data-id=\"0b03c4f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">The traditional electrical grid model cannot accommodate a larger share of renewable energy sources, but smart grids can. However, the smart grid, an electricity network that uses technologies to track energy consumption and drive energy efficiency, requires more data to flow through an increasing number of connection points and devices. As highlighted in our new report<\/span><span data-contrast=\"auto\">, <\/span><a href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/grid-2-0-energys-digital-frontier\/\"><span data-contrast=\"none\">Grid 2.0: Advancing energy\u2019s digital frontier<\/span><\/a><span data-contrast=\"auto\">, t<\/span><span data-contrast=\"none\">his has major implications for system security.<\/span><\/p><p>In short, the smart grid is more vulnerable to cyber-attacks. Here, <strong><a href=\"https:\/\/www.linkedin.com\/in\/stephen-magennis-385258\/\">Stephen Magennis<\/a>, Global Head of E&amp;U at Expleo<\/strong>, <span data-olk-copy-source=\"MessageBody\">outlines <\/span>why smart grids are more vulnerable to cyber-attacks, what security measures can be implemented to help prevent an attack, and a five-step incident response plan.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b4cbe47 elementor-widget elementor-widget-heading\" data-id=\"b4cbe47\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">What is a cyber-attack? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-08fa3d3 elementor-widget elementor-widget-text-editor\" data-id=\"08fa3d3\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">A cyber-attack is a malicious attempt by an individual, a group or government to access a computer system or network to obtain, change or destroy sensitive information, to extort money from users or to disrupt operations.\u00a0<\/span><\/p><p><span data-contrast=\"none\">They can take different forms. Malware attacks can infiltrate a network to steal data or disrupt operations, while phishing attacks can target utility employees for sensitive information. Distributed Denial-of-Service (DDoS) attacks can overwhelm a grid network, prevent user access and lead to outages. Advanced Persistent Threats (APTs) are<\/span><span data-contrast=\"auto\"> often associated with nation states or organised crime groups and are a way to mine data undetected.\u00a0<\/span><\/p><p><span data-contrast=\"none\">Energy and utility infrastructure is vulnerable to cyber-attacks. For example, an attempt could be made to encrypt a power station\u2019s control systems. Under the threat of mass blackouts, the cyber-attacker could demand a ransom for decryption.\u00a0<\/span><span data-contrast=\"none\">\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5bc858f elementor-widget elementor-widget-heading\" data-id=\"5bc858f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Why are smart grids vulnerable to cyber-attacks? <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-8d6ad25 elementor-widget elementor-widget-text-editor\" data-id=\"8d6ad25\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">The many devices and connections required for real-time data flow in smart grids increases the potential attack surface and complexity. As a result, smart grids are more vulnerable to security breaches. Other vulnerabilities include:<\/span><\/p><ul><li><strong>Legacy systems integration\u00a0<\/strong><br \/><span data-contrast=\"none\">Smart grids integrate both new and older systems, but these legacy components may not be designed with cybersecurity in mind.<\/span><\/li><li><strong>Remote access\u00a0<\/strong><br \/><span data-contrast=\"none\">With multiple remote parties monitoring and controlling parts of the smart grid, the number of entry points for attackers increase.<\/span><\/li><li><strong>Distributed Energy Resources (DERs) and smart meters\u00a0<\/strong><br \/><span data-contrast=\"none\">DERs typically have less robust security measures than traditional grid infrastructure, making them susceptible to attacks, including the exploitation of communication protocols.<\/span><\/li><li><strong>Supply chain risks\u00a0<\/strong><br \/><span data-contrast=\"auto\">When products and software come from multiple sources, there is greater risk that one system component can have an inherent security weakness that can be exploited.<\/span><\/li><li><strong>Human error<\/strong><span data-ccp-props=\"{&quot;201341983&quot;:0,&quot;335559740&quot;:259}\"><br \/><\/span>Most security breaches occur due to poor password management or falling victim to phishing scams.<\/li><\/ul><p>Regulatory frameworks and standards have been developed to secure critical energy and utility assets. Compliance is a legal obligation and strategic necessity, safeguarding smart grids from cyber-threats. However, different regulations apply across regions, so multi-national energy and utility companies must ensure consistent security practices. If they are not consistent, it will be harder to implement a robust global cybersecurity strategy.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a3cfc21 elementor-widget elementor-widget-image\" data-id=\"a3cfc21\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"800\" height=\"450\" src=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog-1024x576.jpg\" class=\"attachment-large size-large wp-image-95023\" alt=\"A digital circuit board with glowing blue icons representing cybersecurity elements: a shield with a lock, shopping cart, database, email on a laptop, and documents. The background resembles a complex network of connected pathways.\" srcset=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog-1024x576.jpg 1024w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog-300x169.jpg 300w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog-768x432.jpg 768w, https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg 1280w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0268c4d elementor-widget elementor-widget-heading\" data-id=\"0268c4d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cybersecurity measures and protection strategies for smart grids <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-dabf870 elementor-widget elementor-widget-text-editor\" data-id=\"dabf870\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">O<\/span><span data-contrast=\"auto\">perators can protect data integrity and power availability and strengthen security against the type of threats we have mentioned.<\/span> <span data-contrast=\"none\">To increase the resilience, reliability and security of smart grids, we recommend implementing a series of security measures. These are:<\/span><\/p><ul><li><strong>Firewalls\u00a0<\/strong><br \/><span data-contrast=\"none\">A firewall is a security device for computer networks. Firewalls are necessary to control access between trusted and non-trusted networks as they will help prevent unauthorised entry to the smart grid, reducing the risk of malicious traffic.<\/span><\/li><li><strong>Intrusion Detection Systems (IDS)\u00a0<\/strong><br \/><span data-contrast=\"auto\">An IDS is a tool that continuously monitors network traffic and system behaviour, alerting operators to suspicious patterns or anomalies that may indicate a potential breach or attack.<\/span><\/li><li><strong>Encryption\u00a0<\/strong><br \/><span data-contrast=\"auto\">By encrypting data, only authorised individuals have access to it. It is crucial to protect sensitive data transmitted across smart grid components by restricting access to select individuals. This lowers the risk of a data breach or the misuse of data.<\/span><\/li><li><strong>Regular software updates\u00a0<\/strong><br \/><span data-contrast=\"auto\">Regular software updates unlock the latest security updates and security patches that fix flaws or vulnerabilities in a system and prevents attackers from exploiting them.<\/span><\/li><li><strong>Employee training\u00a0<\/strong><br \/><span data-contrast=\"auto\">A \u2018human firewall\u2019 results from educating employees about cyber-threats and cybersecurity best practice.<\/span><\/li><li><strong>Network segmentation\u00a0<\/strong><br \/><span data-contrast=\"none\">When the smart grid is divided into smaller, isolated networks, this limits the fallout of a security breach by preventing attackers from easily moving laterally across the system.<\/span><\/li><li><strong>Access control\u00a0<\/strong><br \/><span data-contrast=\"auto\">By implementing access control policies, only authorised individuals can access critical systems and data. This reduces the risk of unauthorised access and potential damage.<\/span><\/li><li><strong>Incident response planning\u00a0<\/strong><br \/><span data-contrast=\"auto\">A defined incident response plan enables security teams to respond quickly and effectively to cyber-attacks, minimising damage and downtime.\u00a0<\/span><\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f2736ec elementor-widget elementor-widget-heading\" data-id=\"f2736ec\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Your five-step incident response plan <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7303735 elementor-widget elementor-widget-text-editor\" data-id=\"7303735\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span data-contrast=\"none\">If a cyber-attack does occur, an incident response plan is essential to address and mitigate the impact on the smart grid. We\u2019ve outlined a five-step plan below.\u00a0\u00a0\u00a0\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><ul><li><strong>Step 1: Preparation<br \/><\/strong>Regularly update and test response plans, including drills and automated threat simulations. Train employees across all levels on their role in the event of a cybersecurity incident.<\/li><li><strong>Step 2: Detection and analysis<br \/><\/strong>Use advanced monitoring systems, AI and machine learning to detect anomalies and threats early.<\/li><li><strong>Step 3: Containment, eradication and recovery<br \/><\/strong>Define clear protocols for isolating affected smart grid segments, removing threats and restoring operations. Ensure back-up systems are ready for seamless recovery.<\/li><li><strong>Step 4: Post-incident activity<\/strong><br \/>Review and improve response strategies based on the lessons learned. Incorporate these insights into employee training and future drills.<\/li><li><strong>Step 5: Real-world application<\/strong><br \/>Prepare and share case studies that showcase successful incident response plans. These can be used to raise awareness and educate teams. For example, a case study could highlight how a utility limited damage from a ransomware attack.\u00a0<\/li><\/ul>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-44ff827 elementor-widget elementor-widget-heading\" data-id=\"44ff827\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Secure your critical infrastructure\u00a0<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-7d89e67 elementor-widget elementor-widget-text-editor\" data-id=\"7d89e67\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Secure your energy network so it remains resilient against evolving cybersecurity threats. Expleo has a track record in security assessment, threat modelling and incident response planning for critical network infrastructure. This includes smart grids and connected systems.\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-0ad61cf elementor-widget elementor-widget-heading\" data-id=\"0ad61cf\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Regulatory frameworks <\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<section class=\"elementor-section elementor-inner-section elementor-element elementor-element-b149763 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"b149763\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-5b1a6d9\" data-id=\"5b1a6d9\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-881dac0 elementor-widget elementor-widget-heading\" data-id=\"881dac0\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">US<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1f74ea5 elementor-widget elementor-widget-text-editor\" data-id=\"1f74ea5\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NERC CIP Standards<\/strong><span data-contrast=\"auto\"> <br \/>Mandates security controls to protect CNI, specifically in the energy sector. <\/span><\/p><p><strong>NIST Cybersecurity Framework<\/strong><span data-contrast=\"auto\"> <br \/>Provides a voluntary framework for managing and reducing cybersecurity risks, widely adopted across the energy and utility industries. <\/span>\u00a0<\/p><p><strong>FERC Regulations<\/strong><span data-contrast=\"auto\"> <br \/>Enforces compliance with mandatory cybersecurity standards, including the NERC CIP, so energy providers adhere to best practices in CNI protection\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-9be2a6d\" data-id=\"9be2a6d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-c903326 elementor-widget elementor-widget-heading\" data-id=\"c903326\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">UK<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-4492a8b elementor-widget elementor-widget-text-editor\" data-id=\"4492a8b\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>NCSC Guidance<\/strong><span data-contrast=\"auto\"> <br \/>Offers support and best practices for securing CNI, including advice on protecting smart grid components from cyber-threats.<\/span><\/p><p><strong>NIS Regulations<\/strong><span data-contrast=\"auto\"> <br \/>The NIS Regulations, compliance with which is monitored by the UK government, require energy providers, to implement appropriate security measures.<\/span><\/p><p><strong>Smart Energy Code (SEC)<\/strong><span data-contrast=\"auto\"> <br \/>Governs the smart metering system in the UK, ensuring that all participants adhere to security requirements mandating encryption and other cybersecurity measures to protect consumer data and network integrity.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p><p><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t<div class=\"elementor-column elementor-col-33 elementor-inner-column elementor-element elementor-element-ba33e4d\" data-id=\"ba33e4d\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f3e5ba2 elementor-widget elementor-widget-heading\" data-id=\"f3e5ba2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">EU<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-83436b2 elementor-widget elementor-widget-text-editor\" data-id=\"83436b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>EU NIS Directive<\/strong><span data-contrast=\"auto\"> <br \/>Sets out measures to ensure the security of network and information systems across the EU, including those in the energy sector with a focus on cross-border collaboration. It is supported by ENISA which helps member states improve cybersecurity capabilities and harmonise standards across the EU.<\/span><\/p><p><strong>GDPR<\/strong><span data-contrast=\"auto\"> <br \/>Requires organisations to protect personal data, directly impacting cybersecurity practices within the energy sector.<\/span><\/p><p><strong>CIP Directive<\/strong><span data-contrast=\"auto\"> <br \/>Enhances the protection of CNI, including energy sectors, by establishing common security measures across the EU.\u00a0<\/span><span data-ccp-props=\"{}\">\u00a0<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<div class=\"elementor-element elementor-element-5cadbfa elementor-widget elementor-widget-spacer\" data-id=\"5cadbfa\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cf2c2cd elementor-widget elementor-widget-text-editor\" data-id=\"cf2c2cd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><span class=\"NormalTextRun CommentHighlightClicked SCXW190142750 BCX8\">Security practices across <\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW190142750 BCX8\">jurisdictions<\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW190142750 BCX8\"> is crucial to <\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW190142750 BCX8\">maintain<\/span><span class=\"NormalTextRun CommentHighlightClicked SCXW190142750 BCX8\"> robust cybersecurity across global operations.<\/span><\/p><p>To find out how Expleo can support smart data-driven energy and utilities solutions,\u00a0<a href=\"https:\/\/expleo.com\/global\/en\/contact\/\">contact us<\/a>\u00a0today.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-94fbb1f elementor-widget elementor-widget-spacer\" data-id=\"94fbb1f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-c472d79 gg-image-with-overalpping-text gg-image-with-overalpping-text-v2 gg-container-large elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"c472d79\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;background_background&quot;:&quot;classic&quot;}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-8aeaedb\" data-id=\"8aeaedb\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-655c005 gg-image-with-overalpping-text__heading elementor-widget elementor-widget-heading\" data-id=\"655c005\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Grid 2.0: Advancing energy\u2019s digital frontier<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f8cc9a2 elementor-widget elementor-widget-text-editor\" data-id=\"f8cc9a2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>How the smart grid provides opportunities for innovation and efficiency in energy distribution<\/p><p>\u00a0<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-126b791 gg-button-v6 elementor-widget elementor-widget-button\" data-id=\"126b791\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"button.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"elementor-button-wrapper\">\n\t\t\t\t\t<a class=\"elementor-button elementor-button-link elementor-size-sm\" href=\"https:\/\/expleo.com\/global\/en\/insights\/whitepapers\/grid-2-0-energys-digital-frontier\/\" target=\"_blank\">\n\t\t\t\t\t\t<span class=\"elementor-button-content-wrapper\">\n\t\t\t\t\t\t\t\t\t<span class=\"elementor-button-text\">DOWNLOAD OUR REPORT<\/span>\n\t\t\t\t\t<\/span>\n\t\t\t\t\t<\/a>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>To combat climate change, it is crucial to enhance energy efficiency and reduce carbon emissions worldwide. As the global demand for electricity is increasing by 3.4% annually, a larger portion of our electricity must be sourced from renewable energy sources. The traditional electrical grid model cannot accommodate a larger share of renewable energy sources, but [&hellip;]<\/p>\n","protected":false},"author":81,"featured_media":95023,"parent":0,"template":"","meta":{"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","_angie_page":false,"footnotes":""},"topic":[144,154,212,145,146],"insights-single-templates":[],"industry-taxonomy":[163],"content-type":[23],"country":[141],"service":[216,224,211,215,51,56,83],"class_list":["post-95021","insights","type-insights","status-publish","has-post-thumbnail","hentry","topic-business-transformation","topic-compliance-and-regulation","topic-data-science-and-cybersecurity","topic-digital-transformation","topic-sustainability-and-environment","industry-taxonomy-energy-and-utilities","content-type-blog","country-global","service-digital-transformation","service-industrial-process-operation-optimisation","service-innovation-management-solutions","service-manufacturing-supply-chain","service-people-and-change-management","service-sustainable-design-life-cycle-assessment","service-transformation-consultancy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.0 (Yoast SEO v27.4) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Expleo | Essential cybersecurity measures for smart grids\u00a0\u00a0<\/title>\n<meta name=\"description\" content=\"Discover why regulatory compliance is crucial for advancing energy&#039;s digital frontier and securing the smart grid.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Guarding the grid: essential cybersecurity measures for smart grids\u00a0\u00a0\" \/>\n<meta property=\"og:description\" content=\"Discover why regulatory compliance is crucial for advancing energy&#039;s digital frontier and securing the smart grid.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/\" \/>\n<meta property=\"og:site_name\" content=\"Global EN\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-15T14:04:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/\",\"name\":\"Expleo | Essential cybersecurity measures for smart grids\u00a0\u00a0\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/featured-image_cyberblog.jpg\",\"datePublished\":\"2024-11-13T08:33:12+00:00\",\"dateModified\":\"2025-07-15T14:04:55+00:00\",\"description\":\"Discover why regulatory compliance is crucial for advancing energy's digital frontier and securing the smart grid.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/#primaryimage\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/featured-image_cyberblog.jpg\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2024\\\/10\\\/featured-image_cyberblog.jpg\",\"width\":1280,\"height\":720,\"caption\":\"A digital circuit board with glowing blue icons representing cybersecurity elements: a shield with a lock, shopping cart, database, email on a laptop, and documents. The background resembles a complex network of connected pathways.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/blog\\\/guarding-grid-cybersecurity-smart-grids\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Insights\",\"item\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/insights\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Guarding the grid: essential cybersecurity measures for smart grids\u00a0\u00a0\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"name\":\"Expleo | EN\",\"description\":\"Expleo\",\"publisher\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#organization\",\"name\":\"Expleo | EN\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"contentUrl\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/wp-content\\\/uploads\\\/2019\\\/02\\\/expleo-logo-and-tagline.png\",\"width\":1600,\"height\":774,\"caption\":\"Expleo | EN\"},\"image\":{\"@id\":\"https:\\\/\\\/expleo.com\\\/global\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"}}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Expleo | Essential cybersecurity measures for smart grids\u00a0\u00a0","description":"Discover why regulatory compliance is crucial for advancing energy's digital frontier and securing the smart grid.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/","og_locale":"en_GB","og_type":"article","og_title":"Guarding the grid: essential cybersecurity measures for smart grids\u00a0\u00a0","og_description":"Discover why regulatory compliance is crucial for advancing energy's digital frontier and securing the smart grid.","og_url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/","og_site_name":"Global EN","article_modified_time":"2025-07-15T14:04:55+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Estimated reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/","url":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/","name":"Expleo | Essential cybersecurity measures for smart grids\u00a0\u00a0","isPartOf":{"@id":"https:\/\/expleo.com\/global\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/#primaryimage"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/#primaryimage"},"thumbnailUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg","datePublished":"2024-11-13T08:33:12+00:00","dateModified":"2025-07-15T14:04:55+00:00","description":"Discover why regulatory compliance is crucial for advancing energy's digital frontier and securing the smart grid.","breadcrumb":{"@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/#primaryimage","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2024\/10\/featured-image_cyberblog.jpg","width":1280,"height":720,"caption":"A digital circuit board with glowing blue icons representing cybersecurity elements: a shield with a lock, shopping cart, database, email on a laptop, and documents. The background resembles a complex network of connected pathways."},{"@type":"BreadcrumbList","@id":"https:\/\/expleo.com\/global\/en\/insights\/blog\/guarding-grid-cybersecurity-smart-grids\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/expleo.com\/global\/en\/"},{"@type":"ListItem","position":2,"name":"Insights","item":"https:\/\/expleo.com\/global\/en\/insights\/"},{"@type":"ListItem","position":3,"name":"Guarding the grid: essential cybersecurity measures for smart grids\u00a0\u00a0"}]},{"@type":"WebSite","@id":"https:\/\/expleo.com\/global\/en\/#website","url":"https:\/\/expleo.com\/global\/en\/","name":"Expleo | EN","description":"Expleo","publisher":{"@id":"https:\/\/expleo.com\/global\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/expleo.com\/global\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/expleo.com\/global\/en\/#organization","name":"Expleo | EN","url":"https:\/\/expleo.com\/global\/en\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/","url":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","contentUrl":"https:\/\/expleo.com\/global\/en\/wp-content\/uploads\/2019\/02\/expleo-logo-and-tagline.png","width":1600,"height":774,"caption":"Expleo | EN"},"image":{"@id":"https:\/\/expleo.com\/global\/en\/#\/schema\/logo\/image\/"}}]}},"hreflang":{"rendered":"","structure":[]},"_links":{"self":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/95021","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights"}],"about":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/types\/insights"}],"author":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/users\/81"}],"version-history":[{"count":0,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights\/95021\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media\/95023"}],"wp:attachment":[{"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/media?parent=95021"}],"wp:term":[{"taxonomy":"topic","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/topic?post=95021"},{"taxonomy":"insights-single-templates","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/insights-single-templates?post=95021"},{"taxonomy":"industry-taxonomy","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/industry-taxonomy?post=95021"},{"taxonomy":"content-type","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/content-type?post=95021"},{"taxonomy":"country","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/country?post=95021"},{"taxonomy":"service","embeddable":true,"href":"https:\/\/expleo.com\/global\/en\/wp-json\/wp\/v2\/service?post=95021"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}