{"id":1096,"date":"2020-11-23T10:00:00","date_gmt":"2020-11-23T15:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1096"},"modified":"2020-11-22T16:55:09","modified_gmt":"2020-11-22T21:55:09","slug":"illustrating-the-importance-of-security","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/","title":{"rendered":"Illustrating the Importance of Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-security-is-a-hot-topic-in-technology-today-largely-because-of-the-rise-in-cyber-attacks-understanding-just-how-little-a-bad-actor-needs-to-get-into-a-network-and-do-damage-will-illustrate-exactly-why-security-is-crucial\">Security is a hot topic in technology today, largely because of the rise in cyber-attacks. Understanding just how little a bad actor needs to get into a network and do damage will illustrate exactly why security is crucial.<\/h2>\n\n\n\n<p>Recently, we\u2019ve talked a lot about cybersecurity. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" target=\"_blank\" rel=\"noreferrer noopener\">Identity Access Management controls<\/a>, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/configuration-of-data-storage-solutions-is-important\/\" target=\"_blank\" rel=\"noreferrer noopener\">securing data properly<\/a>, the increase in cyber-attacks (especially in the healthcare industry), <a href=\"https:\/\/www.pwvconsultants.com\/blog\/digital-transformation-modernizes-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\">adopting digital transformation<\/a> and <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-you-must-hire-an-expert-for-cloud-migration\/\" target=\"_blank\" rel=\"noreferrer noopener\">cloud migration<\/a>. These topics are incredibly important to the success of any business, and due to the influx of remote workers, these topics are at the forefront of everyone\u2019s minds. Bad actors are increasing their efforts because they know businesses are strained, and strained businesses are trying to make the necessary security changes, but it\u2019s not easy to do in the current circumstances. However, let\u2019s illustrate some of the necessary upgrades and interesting places hackers have gained access to systems.<br><br>The point of this exercise is not to make any business owner or corporation feel like they are failing. There are many reasons that the issues outlined below become a problem, and typically it is not the fault of the IT department, but rather a budget problem because almost every business has an improperly set information security budget. Even when budget isn\u2019t the reason, there are other reasons upgrades don\u2019t happen. Shut downs are not optional in some instances, making those upgrades impossible to complete.<br><br>For example, there are still machines in operation which run on WindowsXP and Windows 2000. ATM\u2019s and MRI machines both fall into this category in a lot of instances. When was the last time your bank told you that ATM\u2019s would be shut down for a system update and you wouldn&#8217;t have access to your funds for a set amount of time? Sure, they could try to time it in the middle of the night when most people are sleeping or even during the day when people can go into a bank and get their funds, but there\u2019s going to be an impact. Especially for global institutions which have to consider all time zones before executing this task. It\u2019s no easy feat, logistically.<br><br>Then look at the MRI machines. Depending on how a facility is set up, maybe they only have one machine or their systems are integrated and can\u2019t be shut down one by one. What healthcare facility is going to send away a patient or tell them they have to get care elsewhere because their systems are being updated? Again, it\u2019s another logistical nightmare.<br><br>The problem in these two examples is that WinXP and Win2000 have been the most vulnerable systems out in the wild for years, and still are today. None of the businesses associated with the examples given can be faulted for their decision to not shut down and upgrade because it would most certainly cause problems. However, there comes a point in every system\u2019s lifespan that requires a complete shutdown and upgrade. It\u2019s not just about security, it\u2019s about functionality. At some point, because of the lack of support for these systems, they will become fragile and break. When that happens, it\u2019s not only going to result in a lengthier shutdown than a standard upgrade, but it\u2019s going to cost a lot more to fix.<br><br>But it\u2019s not just old systems that need upgrades that cause problems or vulnerabilities. There are IoT devices in every household, in every business which can act as easy entry points for an attack. For instance, bad actors have gotten into businesses by first accessing a device connected to their network. A pacemaker, an IV pump, a slot machine, kitchen appliances located in offices, HVAC systems and fire alarm systems have all been entry points for attacks. The damage that can be done by entering a network this way has been proven in tests. IV pumps have been forced to fail, coffee machines to overheat, but also it is possible to open a backdoor or reprogram that device to just listen to what is happening on the network.<br><br>Remember, all a bad actor needs is a cracked window, a foot in the door. Once they get access to your businesses network, they can work through getting access to your internal network, systems and processes. Many times this means they have sought out an employee\u2019s credentials so they can seemingly legitimately log in to your systems without raising a red flag. IoT devices provide this access easily because they often do not come with encryption or security attached to them. Most people don&#8217;t consider them a security risk, even though they most definitely are.<br><br>All of this should illustrate just how important security is to your business. IAM controls with least privilege must be in use. Multifactor authentication is hugely important. Ensuring that your network is secure, including any business-owned devices that might be attached, is crucial. If an attacker can get into a medical facility through an IV pump and end up shutting down systems, think about the implications it has for your own business. And when you are reviewing your security, be sure to consult an expert as you make your plan. It is vital to have someone who knows the security industry to have eyes on your plan. You wouldn\u2019t trust a medical student to perform intricate neonatal cardiothoracic surgery, so don\u2019t trust just anyone with your security. Your business is the heartbeat of your livelihood, treat it as such!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.<\/p>\n","protected":false},"author":1,"featured_media":1113,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4,14],"tags":[1169,1943,1964,25,1910,31,575,1940,1962,1963,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Illustrating the Importance of Security - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Illustrating the Importance of Security\" \/>\n<meta property=\"og:description\" content=\"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-23T15:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-22T21:55:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Illustrating the Importance of Security\",\"datePublished\":\"2020-11-23T15:00:00+00:00\",\"dateModified\":\"2020-11-22T21:55:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\"},\"wordCount\":927,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg\",\"keywords\":[\"Application Security\",\"AppSec\",\"ATM\",\"cyber attack\",\"CyberSec\",\"Cybersecurity\",\"Information Security\",\"InfoSec\",\"IoT devices\",\"MRI\",\"Security\"],\"articleSection\":[\"Cyber Security\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\",\"name\":\"Illustrating the Importance of Security - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg\",\"datePublished\":\"2020-11-23T15:00:00+00:00\",\"dateModified\":\"2020-11-22T21:55:09+00:00\",\"description\":\"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg\",\"width\":1920,\"height\":1280,\"caption\":\"Image by Michal Jarmoluk from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Illustrating the Importance of Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Illustrating the Importance of Security - PWV Consultants","description":"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/","og_locale":"en_US","og_type":"article","og_title":"Illustrating the Importance of Security","og_description":"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-11-23T15:00:00+00:00","article_modified_time":"2020-11-22T21:55:09+00:00","og_image":[{"width":1920,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Illustrating the Importance of Security","datePublished":"2020-11-23T15:00:00+00:00","dateModified":"2020-11-22T21:55:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/"},"wordCount":927,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg","keywords":["Application Security","AppSec","ATM","cyber attack","CyberSec","Cybersecurity","Information Security","InfoSec","IoT devices","MRI","Security"],"articleSection":["Cyber Security","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/","url":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/","name":"Illustrating the Importance of Security - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg","datePublished":"2020-11-23T15:00:00+00:00","dateModified":"2020-11-22T21:55:09+00:00","description":"Security is at the forefront of technology news today. As such, it is important to pay attention to all devices on a network.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/mri-2813908_1920.jpg","width":1920,"height":1280,"caption":"Image by Michal Jarmoluk from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/illustrating-the-importance-of-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Illustrating the Importance of Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1096"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1096"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1096\/revisions"}],"predecessor-version":[{"id":1114,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1096\/revisions\/1114"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1113"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1096"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1096"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1096"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}