{"id":1291,"date":"2021-01-12T16:28:13","date_gmt":"2021-01-12T21:28:13","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1291"},"modified":"2021-01-12T16:28:16","modified_gmt":"2021-01-12T21:28:16","slug":"security-questions-amid-capitol-breach","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/","title":{"rendered":"Security Questions Amid Capitol Breach"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-as-investigations-continue-it-will-be-important-for-government-it-leaders-to-monitor-all-activity-for-security-the-network-was-exposed-to-unprecedented-access-a-prime-time-to-plant-malicious-code\">As investigations continue, it will be important for government IT leaders to monitor all activity for security. The network was exposed to unprecedented access, a prime time to plant malicious code.<\/h2>\n\n\n\n<p>Last week, the Capitol was overrun by a mob of people. They pushed through barricades and broke windows, although some were simply let in by Capitol police. But once inside, they didn\u2019t stick to the public areas where tours are given. Instead, they infiltrated House and Senate floors, went through offices destroying property, stealing equipment and trashing the place. Many took photos and videos. While various policing and federal agencies are investigating and assessing the damage done so mitigation can happen, there is a major security problem no one has considered: What if someone who entered that building had malware on their mobile device? Or, worse, what if someone managed to plant malware on one of the congressional staff members&#8217; machines?<\/p>\n\n\n\n<p>Think about it, there were people everywhere in that building, there was no real security. They were in offices where they weren\u2019t supposed to enter. They were in areas where there are no cameras. They had unprecedented access to federal networks and information. No one fully knows the extent of information that was exposed or stolen. No one fully knows how much time some of the people had with internal machines that were unlocked like House Speaker Nancy Pelosi, whose emails were on-screen when her laptop was discovered in her office. Private conversations containing sensitive information, potentially strategic planning for upcoming bills or even defense strategies. The truth is, we will not know the extent of information that was exposed for a long time.<\/p>\n\n\n\n<p>Also, consider the SolarWinds breach that came to light last month that impacted the security of many of its clients, including the U.S. government. That attack started in October of 2019 and appears to be the work of Russian hackers, although that has not been confirmed at this time. Federal and private agencies were impacted, and now a second software supplier could be implicated. According to <a rel=\"noreferrer noopener\" href=\"https:\/\/arstechnica.com\/information-technology\/2021\/01\/doj-says-solarwinds-hackers-breached-its-office-365-system-and-read-email\/?comments=1\" target=\"_blank\">Ars Technica<\/a>, \u201cWhile SolarWinds software has been widely suspected as the initial way hackers got in, The New York Times on Wednesday reported that investigators are examining the role another software supplier, JetBrains, may have played. The company, which was founded by three Russian engineers in the Czech Republic, makes a tool called TeamCity that helps developers test and manage software code. TeamCity is used by developers at 300,000 organizations, including SolarWinds and 79 of the Fortune 100 companies.<\/p>\n\n\n\n<p>The Wall Street Journal reported that investigators believe the hackers gained access to a TeamCity server used by SolarWinds but that it was unclear how the system was accessed. In a statement, JetBrains co-CEO Maxim Shafirov said it hasn\u2019t been contacted by SolarWinds or any government agency about any role TeamCity may have played.\u201d<\/p>\n\n\n\n<p>All signs point to some sort of Russian infiltration\/interference, and if not them, then another nation state. It also points to the possibility that an agent of a nation state was planted at the Trump protest and subsequently entered the Capitol. Even if only on the Capitol\u2019s public WiFi network, it\u2019s possible that someone planted a virus, worm, cryptomining program or other malicious package which is now being dispersed through the network doing who knows what kind of damage. It\u2019s also possible that an agent of an organization ended up gaining access to some of the devices that were left open when members of congress were whisked out of their offices to a safe location. Security protocols could have easily been circumvented.<\/p>\n\n\n\n<p>At this point, our country is in a vulnerable and volatile political state. We are ripe for a nation state to attempt to breach our federal defense systems. But even with the SolarWinds hack, no one is paying attention. Everyone is focused on which side is right instead of the weaknesses we exposed in our own system. And that doesn\u2019t just apply to other countries that are our allies, but also to threat actors, activist groups and nation states. We have a major problem on our hands, and until it is addressed, we will remain vulnerable.<\/p>\n\n\n\n<p>As a business owner or leader, while what you do may not directly impact outcomes of the federal government, you can make an immediate impact on your business and employees. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/businesses-need-to-review-security-amid-pandemic\/\" target=\"_blank\" rel=\"noreferrer noopener\">Review your security protocols<\/a>. Review all code in every piece of software, product, application and internal system for weaknesses and malicious findings that have gone unnoticed. <a href=\"https:\/\/www.pwvconsultants.com\/blog\/why-hiring-an-expert-is-crucial-to-success\/\" target=\"_blank\" rel=\"noreferrer noopener\">Bring in an expert<\/a> and have them go over your business from top to bottom. Make your business a fortress. With time and resources, any lock can be broken, but the more difficult your lock is to break, the more likely it is a hacker will move on to easier prey. <\/p>\n","protected":false},"excerpt":{"rendered":"<p>The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.<\/p>\n","protected":false},"author":1,"featured_media":1299,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,4,14],"tags":[709,36,2057,1910,31,920,575,1940,1745,17,2058],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security Questions Amid Capitol Breach - PWV Consultants<\/title>\n<meta name=\"description\" content=\"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Questions Amid Capitol Breach\" \/>\n<meta property=\"og:description\" content=\"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-12T21:28:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-12T21:28:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Security Questions Amid Capitol Breach\",\"datePublished\":\"2021-01-12T21:28:13+00:00\",\"dateModified\":\"2021-01-12T21:28:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg\",\"keywords\":[\"breach\",\"Business\",\"Capitol\",\"CyberSec\",\"Cybersecurity\",\"infiltration\",\"Information Security\",\"InfoSec\",\"malware\",\"Security\",\"SolarWinds\"],\"articleSection\":[\"Cyber Security\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\",\"name\":\"Security Questions Amid Capitol Breach - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg\",\"datePublished\":\"2021-01-12T21:28:13+00:00\",\"dateModified\":\"2021-01-12T21:28:16+00:00\",\"description\":\"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg\",\"width\":1920,\"height\":1440,\"caption\":\"Image by Jackelberry from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Questions Amid Capitol Breach\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Security Questions Amid Capitol Breach - PWV Consultants","description":"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/","og_locale":"en_US","og_type":"article","og_title":"Security Questions Amid Capitol Breach","og_description":"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-12T21:28:13+00:00","article_modified_time":"2021-01-12T21:28:16+00:00","og_image":[{"width":1920,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Security Questions Amid Capitol Breach","datePublished":"2021-01-12T21:28:13+00:00","dateModified":"2021-01-12T21:28:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/"},"wordCount":810,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg","keywords":["breach","Business","Capitol","CyberSec","Cybersecurity","infiltration","Information Security","InfoSec","malware","Security","SolarWinds"],"articleSection":["Cyber Security","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/","url":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/","name":"Security Questions Amid Capitol Breach - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg","datePublished":"2021-01-12T21:28:13+00:00","dateModified":"2021-01-12T21:28:16+00:00","description":"The impact of the Capitol breach will be felt for years. The security of devices left open to the public must be assessed for infiltration.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/us-capitol-477987_1920.jpg","width":1920,"height":1440,"caption":"Image by Jackelberry from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/security-questions-amid-capitol-breach\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Questions Amid Capitol Breach"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1291"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1291"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1291\/revisions"}],"predecessor-version":[{"id":1301,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1291\/revisions\/1301"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1299"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1291"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1291"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1291"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}