{"id":1103,"date":"2020-11-20T15:42:59","date_gmt":"2020-11-20T20:42:59","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1103"},"modified":"2020-11-20T15:43:01","modified_gmt":"2020-11-20T20:43:01","slug":"security-practices-to-seek-in-business-partners","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/","title":{"rendered":"Security Practices to Seek in Business Partners"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-with-security-at-the-forefront-of-everyone-s-minds-today-it-is-important-for-businesses-to-vet-the-security-practices-of-potential-business-partners-it-is-imperative-that-business-owners-do-their-due-diligence-as-it-pertains-to-the-security-of-the-data-they-collect\">With security at the forefront of everyone&#8217;s minds today, it is important for businesses to vet the security practices of potential business partners. It is imperative that business owners do their due diligence as it pertains to the security of the data they collect.<\/h2>\n\n\n\n<p>There are big name companies which have some fantastic security practices, and there are some whose security practices may cause you to question doing business with them. When you\u2019re looking at businesses with which to partner, you should investigate their security methods. There are good practices and bad ones, and they absolutely matter. Whether you seek to become a client of a business or to partner with them to provide a combined service to a targeted customer, you should always verify that their security practices meet your expectations.<\/p>\n\n\n\n<p>Because security practices vary from business to business, there are a few generalized methodologies and processes to pay attention to. Companies with strong security practices employ these three things:<\/p>\n\n\n\n<ol><li>Their security is focused on automation and repeatable processes<\/li><li>Security is done by default to help accelerate development and processes, not something that gets in the way.<\/li><li>They invest in security at a level that is innovative<\/li><\/ol>\n\n\n\n<p>Companies which exhibit these practices include the likes of Google, AWS, Microsoft, Netflix and Hulu. There are more, of course, these are just examples.<\/p>\n\n\n\n<p>On the flip side, there are also companies which do not have good security practices. Sometimes these practices will cause you to question doing business with them, but other times it\u2019s acceptable depending on the situation. Practices done by businesses with subpar security practices have these things in common:<\/p>\n\n\n\n<ol><li>They take information they don\u2019t need (You don\u2019t need to provide your social security number to a social media site, they don\u2019t need it.)<\/li><li>Despite having this information, they often wait to modernize (update) their systems and processes, which means that information is stored in a fragile place that could be exposed if it breaks.<\/li><li>The company may misuse information or misrepresent what they do to ensure security and privacy. This is one of the worst sins because it garners trust from customers and clients in a place where trust isn\u2019t warranted. It\u2019s an ethical issue, these companies are not living up to the trust they are given.<\/li><\/ol>\n\n\n\n<p>There are a few industries that are the biggest culprits in having security practices that don\u2019t measure up. Many banks, insurance companies and state governments fall into this category, but knowing this doesn\u2019t mean you just don\u2019t do business with them either. Every business needs a bank and an insurance company, and many businesses find it positive to have a solid working relationship with local and state governments.&nbsp;<\/p>\n\n\n\n<p>When it comes to working with these industries, you just have to know that their security might not be what you want it to be. Rest assured, though, these industries are aware that this is a problem. Updating their systems without causing a major disruption to business is often tricky. But they WANT to keep your information secure, they aren\u2019t bad actors, they are just businesses which have no other option but to move slowly.<\/p>\n\n\n\n<p>Right now, with all of the recent cyberattacks and <a href=\"https:\/\/www.pwvconsultants.com\/blog\/all-open-sourced-code-should-be-reviewed\/\" target=\"_blank\" rel=\"noreferrer noopener\">malicious packages in open-sourced code<\/a>, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">security is at the forefront of everyone\u2019s minds<\/a>. Every business has different needs, so do your research. Find out what security practices other businesses in your industry are doing, dig into the security practices of any business you plan to work with, whether as a client or partner. Make sure you are comfortable with how they run security before you sign anything, and even if you aren\u2019t, double back and ask yourself if the lack of security is an okay trade-off for the benefit provided.\u00a0<\/p>\n\n\n\n<p>Securing your own business is squarely on your shoulders, but you also do not want to compromise private and sensitive information through a third party simply because you didn\u2019t know their security was bad. Do your due diligence in all areas of business, including security. And, if you\u2019re unsure of how to vet a company\u2019s security practices, you can always consult a security expert to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity is on the minds of businesses worldwide. Recent attacks show  businesses need to vet security practices of business partners.<\/p>\n","protected":false},"author":1,"featured_media":1107,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4],"tags":[36,1961,1910,31,575,1940,17,1960],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Practices to Seek in Business Partners - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Practices to Seek in Business Partners\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-11-20T20:42:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-11-20T20:43:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Security Practices to Seek in Business Partners\",\"datePublished\":\"2020-11-20T20:42:59+00:00\",\"dateModified\":\"2020-11-20T20:43:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\"},\"wordCount\":711,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg\",\"keywords\":[\"Business\",\"business partner\",\"CyberSec\",\"Cybersecurity\",\"Information Security\",\"InfoSec\",\"Security\",\"security practices\"],\"articleSection\":[\"Cyber Security\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\",\"name\":\"Security Practices to Seek in Business Partners - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg\",\"datePublished\":\"2020-11-20T20:42:59+00:00\",\"dateModified\":\"2020-11-20T20:43:01+00:00\",\"description\":\"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg\",\"width\":1920,\"height\":1152,\"caption\":\"Image by Pete Linforth from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Practices to Seek in Business Partners\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Practices to Seek in Business Partners - PWV Consultants","description":"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/","og_locale":"en_US","og_type":"article","og_title":"Security Practices to Seek in Business Partners","og_description":"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-11-20T20:42:59+00:00","article_modified_time":"2020-11-20T20:43:01+00:00","og_image":[{"width":1920,"height":1152,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Security Practices to Seek in Business Partners","datePublished":"2020-11-20T20:42:59+00:00","dateModified":"2020-11-20T20:43:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/"},"wordCount":711,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg","keywords":["Business","business partner","CyberSec","Cybersecurity","Information Security","InfoSec","Security","security practices"],"articleSection":["Cyber Security","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/","url":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/","name":"Security Practices to Seek in Business Partners - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg","datePublished":"2020-11-20T20:42:59+00:00","dateModified":"2020-11-20T20:43:01+00:00","description":"Cybersecurity is on the minds of businesses worldwide. Recent attacks show businesses need to vet security practices of business partners.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/11\/cyber-security-3443628_1920.jpg","width":1920,"height":1152,"caption":"Image by Pete Linforth from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-practices-to-seek-in-business-partners\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Practices to Seek in Business Partners"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1103"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1103"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1103\/revisions"}],"predecessor-version":[{"id":1109,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1103\/revisions\/1109"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1107"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1103"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1103"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1103"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}