{"id":1691,"date":"2021-03-26T17:08:15","date_gmt":"2021-03-26T21:08:15","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1691"},"modified":"2021-03-26T17:08:18","modified_gmt":"2021-03-26T21:08:18","slug":"roll-breach-illustrates-why-security-audits-matter","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/","title":{"rendered":"Roll Breach Illustrates Why Security Audits Matter"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-last-week-roll-announced-it-had-been-breached-and-hackers-stole-5-7-million-from-its-hot-wallet-this-week-roll-still-doesn-t-know-how-their-system-was-infiltrated\">Last week, Roll announced it had been breached and hackers stole $5.7 million from its hot wallet. This week, Roll still doesn\u2019t know how their system was infiltrated.<\/h2>\n\n\n\n<p>Roll, a social currency platform that is barely a year old, announced it suffered a breach last week. Someone infiltrated their systems and stole $5.7 million from its hot wallet. As of the writing of this article, the company still doesn\u2019t know how the attackers gained access. Security is at the forefront of business news today, and has been for the better part of a year. Given that so many businesses are focusing on securing their sensitive data, it seems surprising that there are still no answers and no fix a week later.<\/p>\n\n\n\n<p>Roll\u2019s platform allows creators to mint and distribute Ethereum-based cryptocurrency known as social tokens. The company set up a relief fund to help creators recoup their losses, and the available funds were upped from $500,000 to $750,000 recently. They also indicated they would hire a third-party to audit security infrastructure, something Roll revealed to TechCrunch was never completed prior to the company\u2019s launch.<\/p>\n\n\n\n<blockquote class=\"wp-block-quote\"><p>\u201cWe weren\u2019t ready from a security standpoint,\u201d said Roll CEO Bradley Miles.<\/p><p>\u201cThis incident was a big setback for us, we will revamp a lot of infrastructure around this that we have in place to prevent something like this from happening again,\u201d said Roll\u2019s chief technology officer Sid Kalla, who oversees cybersecurity because the company does not have dedicated staff.<\/p><p>The executives said while its smart contracts \u2014 the technology that underpins the blockchain \u2014 were audited by a third-party firm, the rest of the company\u2019s infrastructure was never stress-tested.<\/p><p>\u201cThat was a shortcoming on our end, and we should have done this earlier,\u201d said Kalla.\u201d<\/p><cite><a href=\"https:\/\/techcrunch.com\/2021\/03\/23\/roll-still-doesnt-know-how-its-hot-wallet-was-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">TechCrunch<\/a><\/cite><\/blockquote>\n\n\n\n<p>They weren\u2019t ready from a security standpoint. That was a shortcoming, they should have done it earlier. These are the words of people who didn\u2019t hire or consult an expert for help. They launched a business without ever seeing what it can really handle and where potential vulnerabilities may lie. Yet, even now, Roll has been unable to land a third-party security investigator to investigate the breach, leaving them to search for answers on their own. Roll uses AWS and says that only a handful of employees have access to its private keyes secured by 2FA. Chainalysis, a forensic blockchain company, reviewed the logs and did not see any logins out of the norm.<\/p>\n\n\n\n<p>There are so many problems with this entire scenario. Roll didn\u2019t have a security audit prior to launch. They don\u2019t have any security personnel on staff, nor do they apparently contract with one to help in these situations. They are trying to diagnose the problem themselves, although they are admittedly not security gurus, which is why they don\u2019t have any answers. They haven\u2019t brought anyone else in to help diagnose the problem. They likely didn\u2019t implement any form of incident response, which means they may have no idea if the hacker is still in their systems or if they were able to leave a backdoor for easy access.<\/p>\n\n\n\n<p>There are so many implications for all of the things improperly handled that it\u2019s impossible to go over all of them. Roll is committed to rebuilding its infrastructure, although no timeline has been released for completion. They will not allow users to make withdrawals until the infrastructure is secure. They say they will bring in a security company to audit the infrastructure changes and it will reduce how many tokens it holds in its hot wallet. They also plan to hire a CISO after its next round of financing closes.<\/p>\n\n\n\n<p>Those are all great steps, things they definitely need to do. Things they should have done from the beginning. The ramifications from the breach followed by the lack of incident response and mitigation will not be known for some time, especially since the problem hasn\u2019t been found to be fixed.&nbsp;<\/p>\n\n\n\n<p>If you are a business owner or potential business owner, someone verging on entrepreneurship or otherwise in a position of leadership within a company, take note of this breach. Learn from it. Make sure your security teams have what they need, bring in an expert if you don\u2019t have a team. The activity by threat actors increases regularly. Be proactive in your prevention techniques, and make sure you have an incident response plan in place.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.<\/p>\n","protected":false},"author":1,"featured_media":1702,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,959],"tags":[1169,1943,36,2167,1910,31,926,928,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Roll Breach Illustrates Why Security Audits Matter - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Roll Breach Illustrates Why Security Audits Matter\" \/>\n<meta property=\"og:description\" content=\"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-26T21:08:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-26T21:08:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Roll Breach Illustrates Why Security Audits Matter\",\"datePublished\":\"2021-03-26T21:08:15+00:00\",\"dateModified\":\"2021-03-26T21:08:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\"},\"wordCount\":747,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg\",\"keywords\":[\"Application Security\",\"AppSec\",\"Business\",\"cyber-attack\",\"CyberSec\",\"Cybersecurity\",\"data breach\",\"hackers\",\"Security\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Data Breaches\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\",\"name\":\"Roll Breach Illustrates Why Security Audits Matter - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg\",\"datePublished\":\"2021-03-26T21:08:15+00:00\",\"dateModified\":\"2021-03-26T21:08:18+00:00\",\"description\":\"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg\",\"width\":2560,\"height\":1440},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Roll Breach Illustrates Why Security Audits Matter\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Roll Breach Illustrates Why Security Audits Matter - PWV Consultants","description":"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/","og_locale":"en_US","og_type":"article","og_title":"Roll Breach Illustrates Why Security Audits Matter","og_description":"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-03-26T21:08:15+00:00","article_modified_time":"2021-03-26T21:08:18+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Roll Breach Illustrates Why Security Audits Matter","datePublished":"2021-03-26T21:08:15+00:00","dateModified":"2021-03-26T21:08:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/"},"wordCount":747,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg","keywords":["Application Security","AppSec","Business","cyber-attack","CyberSec","Cybersecurity","data breach","hackers","Security"],"articleSection":["Application Security","Cyber Security","Data Breaches"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/","url":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/","name":"Roll Breach Illustrates Why Security Audits Matter - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg","datePublished":"2021-03-26T21:08:15+00:00","dateModified":"2021-03-26T21:08:18+00:00","description":"Roll, a startup based in ethereum blockchain, was breached for $5.7 million. The handling of this situation shows why security audits matter.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/03\/Roll-Breach-scaled.jpeg","width":2560,"height":1440},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/roll-breach-illustrates-why-security-audits-matter\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Roll Breach Illustrates Why Security Audits Matter"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1691"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1691"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1691\/revisions"}],"predecessor-version":[{"id":1705,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1691\/revisions\/1705"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1702"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1691"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1691"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1691"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}