{"id":1061,"date":"2020-11-10T10:46:00","date_gmt":"2020-11-10T15:46:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1061"},"modified":"2020-11-09T16:06:51","modified_gmt":"2020-11-09T21:06:51","slug":"top-3-biggest-cybersecurity-mistakes","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/","title":{"rendered":"Top 3 Biggest Cybersecurity Mistakes"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">As business leaders learn more about cybersecurity, there will still inevitably be mistakes. The important thing is to keep learning and review practices regularly.<\/h2>\n\n\n\n<p>In a world where cybersecurity is becoming more widely appreciated by business owners and employees alike, there is still a learning curve. No matter what area of business is being discussed, when it\u2019s something new, items are often missed simply due to lack of knowledge. Cybersecurity is no different, but some overlooked practices are worse than others. Here are the top three worst security misses we have seen, and why they are bad:<\/p>\n\n\n\n<p><strong>Giving everyone in a division a cloud account<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Access Management (IAM)<\/a> is a very important item for business leaders to pay attention to. This is how you determine who needs access to which accounts. When determining who needs access, the answer is almost never EVERYONE. Least privilege should always be employed, meaning that only people who need access to a system in order to do their job should have it. Your janitor or office cleaner does not need access to your cloud accounts or servers. In fact, the only systems they might need access to are ordering supplies and timekeeping.\u00a0<\/p>\n\n\n\n<p>On top of NOT giving everyone access to every single system, their passwords need to be strong. Passwords should be a minimum of 16 characters, or if your minimum is less than that, then passwords should be changed every 90 days and be unable to be repeated. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">Two-factor authentication<\/a> is always a good idea as well because if credentials do get stolen, this could alert the user to someone potentially trying to use their information to log in. Using Passw0rd1, p@sswOrd1 or any variation is an incredibly bad idea, especially as default passwords.<\/p>\n\n\n\n<p><strong>Not requiring authorization to use an application<\/strong><\/p>\n\n\n\n<p>This is a massive problem with huge cybersecurity consequences. It doesn\u2019t matter what internal system it is, every single person should have a dedicated sign-on. Password recommendations are the same as above, and it is important to still remember that not everyone needs access to every system. If it\u2019s not essential to an employee\u2019s job function, do not grant access. Not requiring a log in for an application means that a bad actor can enter the building and on any machine access that system. Once that system is accessed, it\u2019s free reign for the attacker to do whatever damage they came to do.\u00a0<\/p>\n\n\n\n<p>The biggest takeaway from this one is to remember that <a href=\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\" target=\"_blank\" rel=\"noreferrer noopener\">all an attacker needs is a way in<\/a>. If you provide that by allowing just anyone to access an internal system, you are jeopardizing the entire business.<\/p>\n\n\n\n<p><strong>Taking social security numbers for marketing gimmick and not protecting them<\/strong><\/p>\n\n\n\n<p>First, this is a completely unnecessary practice. If the gimmick you are running ends with monetary value that needs tracking, get the social security number of the receivers only when needed for tax purposes. But there is no reason to collect the social security numbers for everyone participating, you have no need for them.\u00a0Stop collecting information you don&#8217;t need.<\/p>\n\n\n\n<p>Second, if you decide to collect social security numbers for ANY reason, you cannot just throw them on a public bucket. They MUST be protected, encrypted, isolated away from the rest of the network and the broad internet. If those numbers become exposed, your business is on the hook for any damage done with them.<\/p>\n\n\n\n<p><strong>Your mistakes are a hacker&#8217;s best friend<\/strong><\/p>\n\n\n\n<p>In all of these examples, the mistake made was due to ignorance, lack of knowledge, by business leaders. This is not to shame them, but to bring awareness to other business owners on problems they may have under their noses that they don\u2019t even know about. With cybersecurity coming to the forefront of the news on an almost daily basis now, it is important for business leaders to know their own <a href=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">security practices and to ensure they are solid<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.<\/p>\n","protected":false},"author":1,"featured_media":1069,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,4],"tags":[1169,1943,1910,31,1831,1065,575,1940,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 3 Biggest Cybersecurity Mistakes - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 3 Biggest Cybersecurity Mistakes\" \/>\n<meta property=\"og:description\" content=\"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-10T15:46:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-09T21:06:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"855\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Top 3 Biggest Cybersecurity Mistakes\",\"datePublished\":\"2020-11-10T15:46:00+00:00\",\"dateModified\":\"2020-11-09T21:06:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\"},\"wordCount\":660,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg\",\"keywords\":[\"Application Security\",\"AppSec\",\"CyberSec\",\"Cybersecurity\",\"data protection\",\"IAM controls\",\"Information Security\",\"InfoSec\",\"Security\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\",\"name\":\"Top 3 Biggest Cybersecurity Mistakes - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg\",\"datePublished\":\"2020-11-10T15:46:00+00:00\",\"dateModified\":\"2020-11-09T21:06:51+00:00\",\"description\":\"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg\",\"width\":1920,\"height\":855,\"caption\":\"Image by Gerd Altmann from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Top 3 Biggest Cybersecurity Mistakes\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 3 Biggest Cybersecurity Mistakes - PWV Consultants","description":"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/","og_locale":"en_US","og_type":"article","og_title":"Top 3 Biggest Cybersecurity Mistakes","og_description":"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-11-10T15:46:00+00:00","article_modified_time":"2020-11-09T21:06:51+00:00","og_image":[{"width":1920,"height":855,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Top 3 Biggest Cybersecurity Mistakes","datePublished":"2020-11-10T15:46:00+00:00","dateModified":"2020-11-09T21:06:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/"},"wordCount":660,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg","keywords":["Application Security","AppSec","CyberSec","Cybersecurity","data protection","IAM controls","Information Security","InfoSec","Security"],"articleSection":["Application Security","Cyber Security","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/","url":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/","name":"Top 3 Biggest Cybersecurity Mistakes - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg","datePublished":"2020-11-10T15:46:00+00:00","dateModified":"2020-11-09T21:06:51+00:00","description":"Cyber-attacks are on the rise and business leaders need to review cybersecurity practices. Lack of knowledge is not an excuse for negligence.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/internet-1862312_1920.jpg","width":1920,"height":855,"caption":"Image by Gerd Altmann from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/top-3-biggest-cybersecurity-mistakes\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Top 3 Biggest Cybersecurity Mistakes"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1061"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1061"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1061\/revisions"}],"predecessor-version":[{"id":1070,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1061\/revisions\/1070"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1069"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}