{"id":1037,"date":"2020-10-30T13:07:28","date_gmt":"2020-10-30T17:07:28","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1037"},"modified":"2020-10-30T13:07:30","modified_gmt":"2020-10-30T17:07:30","slug":"encryption-is-a-vital-piece-of-security","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/","title":{"rendered":"Encryption is a Vital Piece of Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">As international governments argue for easier access to encrypted data for legal investigations, tech companies are fighting back.&nbsp;<\/h2>\n\n\n\n<p>Encryption is a major player in <a href=\"https:\/\/www.pwvconsultants.com\/blog\/information-security-preparation-is-protection\/\" target=\"_blank\" rel=\"noreferrer noopener\">Information Security<\/a>. Remember, InfoSec encompasses Cybersecurity, Application Security and all aspects of securing data (information). Encryption is everywhere, it\u2019s used by every business worldwide. This is what keeps our personal and private information, proprietary business information and anything else that is sensitive, safe from an attack. This is essentially how ransomware works, too, by encrypting information and holding it hostage until a ransom is paid.<\/p>\n\n\n\n<p>We hear about encryption a lot, but what is it and how does it really work? <a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-what-is-encryption.html\">According to Norton<\/a>, \u201cEncryption is the process of taking plain text, like a text message or email, and scrambling it into an unreadable format \u2014 called \u201ccipher text.\u201d This helps protect the confidentiality of digital data either stored on computer systems or transmitted through a network like the internet.<\/p>\n\n\n\n<p>When the intended recipient accesses the message, the information is translated back to its original form. This is called decryption.<\/p>\n\n\n\n<p>To unlock the message, both the sender and the recipient have to use a \u201csecret\u201d encryption key \u2014 a collection of algorithms that scramble and unscramble data back to a readable format.\u201d<\/p>\n\n\n\n<p>So, when we talked yesterday about <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-law-and-encrypted-data-an-ongoing-saga\/\" target=\"_blank\" rel=\"noreferrer noopener\">governments wanting easier access to encrypted information<\/a> for legal investigations, this is what we were talking about. Governments want the process of getting information needed for an investigation to be easier, but tech companies argue that it puts information at risk because it would create a soft spot, single point of entry for hackers. Both are legitimate arguments.<\/p>\n\n\n\n<p>Here\u2019s the thing, though. We should be viewing this battle over encryption differently. You don\u2019t necessarily know what is encrypted until it\u2019s decrypted. Think about it like this, if someone sells you a computer, they have no idea what you are going to do with it. They could tie it to a dirty bomb or use it to store social security numbers and other sensitive information. But no one would ever say that they want the manufacturer to be able to flip a switch and poke around inside a machine that was purchased. The same goes for encryption, you don\u2019t know what you are providing access to until decryption is completed, meaning you don\u2019t know what information you could potentially expose that isn\u2019t the target.<\/p>\n\n\n\n<p>The way encryption is designed and functions is to protect data. If you put in some method to access that data in a different way, it\u2019s no longer protected. Just like the computer example above, you can sell someone a computer and tell them to do something good with it. Some people will do good things, but others will do bad. But that doesn\u2019t mean you let the manufacturer poke around a machine whenever they want.<\/p>\n\n\n\n<p>The countries involved in asking for a backdoor need to understand how encryption works and why they can\u2019t just have a backdoor put in. One, it would pose a major security problem for all of the reasons we\u2019ve already discussed. Two, putting in a backdoor requires a high level of technical complexity to either create an algorithm that can be reversed given some skeleton key, or figure out how to protect some key registry that everyone in the world will try to steal. While tech companies and businesses in general understand the need for law enforcement to access certain information at times, they also understand that this suggestion will create more problems than it will solve.<\/p>\n\n\n\n<p>On top of that, should governments around the world find a way to make this happen, who is to say that\u2019s where they will stop? Does it end with encryption at rest, like unlocking a phone or decrypting a hard drive? Or are we going to let them spy on internet traffic, too? Because that is going to bring up a whole host of different issues. The ask is akin to asking a lock maker to have a key that opens every lock they&#8217;ve ever made. It&#8217;s a terrible idea!<\/p>\n\n\n\n<p>The bottom line is that we need encryption. Encryption is what keeps our sensitive information safe. Businesses are required, by law, to be compliant and protect everyone\u2019s private information. If they don\u2019t, or if they are breached and information is exposed, then that business is on the hook for damages on top of fixing the issue and dealing with legalities. Encryption is a vital piece of data protection. Tampering with it, even for legal reasons, is a bad idea.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The legal battle over encryption isn&#8217;t going anywhere. It is important to understand why encryption matters and how it secures our data.<\/p>\n","protected":false},"author":1,"featured_media":1041,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[4,14],"tags":[28,1169,1933,686,31,925,1932,1202,1865,40,575,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Encryption is a Vital Piece of Security - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The legal battle over encryption isn&#039;t going anywhere. It is important to understand why encryption matters and how it secures our data.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption is a Vital Piece of Security\" \/>\n<meta property=\"og:description\" content=\"The legal battle over encryption isn&#039;t going anywhere. It is important to understand why encryption matters and how it secures our data.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-30T17:07:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-30T17:07:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Encryption is a Vital Piece of Security\",\"datePublished\":\"2020-10-30T17:07:28+00:00\",\"dateModified\":\"2020-10-30T17:07:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\"},\"wordCount\":776,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png\",\"keywords\":[\"App Sec\",\"Application Security\",\"backdoor\",\"cyber sec\",\"Cybersecurity\",\"data\",\"encrypted data\",\"encryption\",\"governments\",\"Info Sec\",\"Information Security\",\"Security\"],\"articleSection\":[\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\",\"name\":\"Encryption is a Vital Piece of Security - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png\",\"datePublished\":\"2020-10-30T17:07:28+00:00\",\"dateModified\":\"2020-10-30T17:07:30+00:00\",\"description\":\"The legal battle over encryption isn't going anywhere. It is important to understand why encryption matters and how it secures our data.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png\",\"width\":1280,\"height\":1280,\"caption\":\"Image by OpenClipart-Vectors from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption is a Vital Piece of Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Encryption is a Vital Piece of Security - PWV Consultants","description":"The legal battle over encryption isn't going anywhere. It is important to understand why encryption matters and how it secures our data.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/","og_locale":"en_US","og_type":"article","og_title":"Encryption is a Vital Piece of Security","og_description":"The legal battle over encryption isn't going anywhere. It is important to understand why encryption matters and how it secures our data.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-30T17:07:28+00:00","article_modified_time":"2020-10-30T17:07:30+00:00","og_image":[{"width":1280,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png","type":"image\/png"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Encryption is a Vital Piece of Security","datePublished":"2020-10-30T17:07:28+00:00","dateModified":"2020-10-30T17:07:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/"},"wordCount":776,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png","keywords":["App Sec","Application Security","backdoor","cyber sec","Cybersecurity","data","encrypted data","encryption","governments","Info Sec","Information Security","Security"],"articleSection":["Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/","url":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/","name":"Encryption is a Vital Piece of Security - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png","datePublished":"2020-10-30T17:07:28+00:00","dateModified":"2020-10-30T17:07:30+00:00","description":"The legal battle over encryption isn't going anywhere. It is important to understand why encryption matters and how it secures our data.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/computer-1294045_1280.png","width":1280,"height":1280,"caption":"Image by OpenClipart-Vectors from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/encryption-is-a-vital-piece-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Encryption is a Vital Piece of Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1037"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1037"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1037\/revisions"}],"predecessor-version":[{"id":1042,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1037\/revisions\/1042"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1041"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}