{"id":1363,"date":"2021-01-26T11:00:14","date_gmt":"2021-01-26T16:00:14","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1363"},"modified":"2021-01-25T15:48:25","modified_gmt":"2021-01-25T20:48:25","slug":"access-controls-are-for-more-than-cloud-systems","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/","title":{"rendered":"Access Controls Are For More Than Cloud Systems"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-access-controls-are-important-for-every-internal-business-system-not-just-cloud-based-systems-adt-s-recent-litigation-due-to-an-employee-s-actions-shows-the-importance-of-access-controls\">Access controls are important for every internal business system, not just cloud-based systems. ADT&#8217;s recent litigation due to an employee&#8217;s actions shows the importance of access controls.<\/h2>\n\n\n\n<p>There\u2019s been so much talk of bad actors, malware, ransomware and other security problems that many businesses have failed to account for the one problem that could be the biggest problem: Insider threats. Insider threats happen when someone who has access to your internal business systems has their credentials used in some inappropriate fashion. Whether they do it themselves with the intent to extort the business, or whether those credentials are stolen really doesn\u2019t matter. What matters is that now someone is inside your business and there are no red flags to indicate they shouldn\u2019t be there.<\/p>\n\n\n\n<p>We\u2019ve talked before about <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" target=\"_blank\" rel=\"noreferrer noopener\">IAM controls<\/a>, which most people generally associate with cloud use. However, IAM controls are a necessary part of every business\u2019 security protocols. These controls dictate which employees have access to which systems. Your administrative team doesn\u2019t need access to software development code. Your customer-facing employees don\u2019t need access to security protocols. The fewer people who have access to each system, the less surface area there is for an insider threat.<\/p>\n\n\n\n<p>A good example of what can happen when permissions aren\u2019t appropriately set is an ADT employee who is charged in Texas. According to <a href=\"https:\/\/arstechnica.com\/information-technology\/2021\/01\/home-alarm-tech-backdoored-security-cameras-to-spy-on-customers-having-sex\/\" target=\"_blank\" rel=\"noreferrer noopener\">Ars Technica<\/a>, \u201cTelesforo Aviles, a 35-year-old former employee of home and small office security company AADT, said that over a five-year period, he accessed the cameras of roughly 200 customer accounts on more than 9,600 occasions&#8211;all without the permission or knowledge of customers.\u201d<\/p>\n\n\n\n<p>ADT discovered the incident and took it to prosecutors last April, but it\u2019s not going to be enough to save them. They\u2019ve already been hit with at least <a href=\"https:\/\/finance.yahoo.com\/news\/adt-security-hit-class-action-175600283.html\" target=\"_blank\" rel=\"noreferrer noopener\">two proposed class-action lawsuits<\/a>. One of the suites is for the ADT customers themselves, and the other one is for other people in the home. The second suit alleges that one of the victims was a minor at the time of the breach.<\/p>\n\n\n\n<p>While the perpetrator, Aviles, is currently facing charges in court, ADT is still ultimately responsible for his dishonesty and breach of privacy. Customers will continue to join the class-action lawsuits and ADT will suffer both financially and in image. They\u2019ll have fines to pay and legal fees to shell out for lawyers. And it all could have been prevented by properly vetting employees and actively ensuring that employees aren\u2019t accessing customer information through proper access controls.<\/p>\n\n\n\n<p>This is actually a really good example of what can happen when access controls are not set properly. ADT is going to lose a good amount of money in paying those fines, fees and reparations, but they\u2019re also going to lose customers and struggle to regain the trust of consumers. The business has hit some rocky water, but it still could have been worse. Aviles could have sabotaged customer accounts and extorted them for money, but he didn\u2019t. If a threat actor was the one doing this, that person could have done incredible internal damage to ADT like implanting malware or rendering their security services useless, leaving every customer without service. If they know how to do that in a specific area, they could collaborate with a physical team to break in and steal things. Now ADT is on the hook for that, too.<\/p>\n\n\n\n<p>Access controls are vital to the security of a business. The fewer people who have access to a system, the smaller the surface area a threat actor has to exploit. Yes, even with access controls, if someone loses their credentials or has them stolen, a bad actor can figure out how to get to other systems. The difference is that it will raise red flags and set off alarm bells warning security personnel that there is a problem that needs to be addressed. Be sure to set your access controls properly to reduce insider and accidental insider threats!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.<\/p>\n","protected":false},"author":1,"featured_media":1375,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,4],"tags":[2078,2081,2079,36,30,51,1065,575,1940,33,1813],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Access Controls Are For More Than Cloud Systems - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Access Controls Are For More Than Cloud Systems\" \/>\n<meta property=\"og:description\" content=\"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-01-26T16:00:14+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-25T20:48:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1280\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Access Controls Are For More Than Cloud Systems\",\"datePublished\":\"2021-01-26T16:00:14+00:00\",\"dateModified\":\"2021-01-25T20:48:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\"},\"wordCount\":672,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg\",\"keywords\":[\"Access Controls\",\"Accidental Insider Threats\",\"ADT\",\"Business\",\"Compliance\",\"Credentials\",\"IAM controls\",\"Information Security\",\"InfoSec\",\"Insider Threats\",\"least privilege\"],\"articleSection\":[\"Business\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\",\"name\":\"Access Controls Are For More Than Cloud Systems - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg\",\"datePublished\":\"2021-01-26T16:00:14+00:00\",\"dateModified\":\"2021-01-25T20:48:25+00:00\",\"description\":\"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg\",\"width\":2560,\"height\":1280,\"caption\":\"Caucasian manager is pushing ACCESS CONTROL on an interactive touch screen interface. Physical and information security concept for selective and authorized permission to access resources or places.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Access Controls Are For More Than Cloud Systems\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Access Controls Are For More Than Cloud Systems - PWV Consultants","description":"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/","og_locale":"en_US","og_type":"article","og_title":"Access Controls Are For More Than Cloud Systems","og_description":"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-01-26T16:00:14+00:00","article_modified_time":"2021-01-25T20:48:25+00:00","og_image":[{"width":2560,"height":1280,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Access Controls Are For More Than Cloud Systems","datePublished":"2021-01-26T16:00:14+00:00","dateModified":"2021-01-25T20:48:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/"},"wordCount":672,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg","keywords":["Access Controls","Accidental Insider Threats","ADT","Business","Compliance","Credentials","IAM controls","Information Security","InfoSec","Insider Threats","least privilege"],"articleSection":["Business","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/","url":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/","name":"Access Controls Are For More Than Cloud Systems - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg","datePublished":"2021-01-26T16:00:14+00:00","dateModified":"2021-01-25T20:48:25+00:00","description":"Access controls should be employed in every part of business. Insider threats leave businesses on the hook for any damage done in their name.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/01\/Access-Controls-scaled.jpeg","width":2560,"height":1280,"caption":"Caucasian manager is pushing ACCESS CONTROL on an interactive touch screen interface. Physical and information security concept for selective and authorized permission to access resources or places."},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/access-controls-are-for-more-than-cloud-systems\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Access Controls Are For More Than Cloud Systems"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1363"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1363"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1363\/revisions"}],"predecessor-version":[{"id":1377,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1363\/revisions\/1377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1375"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1363"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1363"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1363"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}