{"id":1758,"date":"2021-04-16T16:06:03","date_gmt":"2021-04-16T20:06:03","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1758"},"modified":"2021-04-16T16:06:06","modified_gmt":"2021-04-16T20:06:06","slug":"employee-exit-procedures-are-vital-to-security","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/","title":{"rendered":"Employee Exit Procedures Are Vital to Security"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-pre-pandemic-employee-exit-procedures-were-important-in-the-middle-of-the-pandemic-and-remote-work-those-procedures-are-imperative\">Pre-pandemic, employee exit procedures were important. In the middle of the pandemic and remote work, those procedures are imperative.<\/h2>\n\n\n\n<p>Any time an employee leaves their place of work, the employer will conduct an exit interview. Unless the employee is let go, in which case there\u2019s not usually a need. The now former employee moves on to their next opportunity, but the business isn\u2019t done yet. There are still procedures that have to take place for legal and compliance reasons, not to mention the security problems that can happen. Especially now, in the midst of the coronavirus pandemic where every business employs remote workers, it is vital to follow employee exit procedures and remove access when someone leaves.<\/p>\n\n\n\n<p>First, let\u2019s forget the pandemic. Let\u2019s pretend that life is a pre-pandemic \u201cnormal\u201d for businesses. When an employee is hired, you enter their information into your human resources system. You add their name, address, date of birth, SSN, email, salary information and position. As the employee continues their tenure, any disciplinary action or commendations earned will be documented there. The employee\u2019s position dictates what internal systems they have access to and how deep that access goes.<\/p>\n\n\n\n<p>The longer an employee is with a company, the more likely it is that their position changes and their access needs change. If that employee ever leaves the company, regardless of the terms, any and all credentials they created must be stripped of access. No system can be left untouched because every system is an access point. If that access is not removed, it doesn\u2019t even have to be the ex-employee who gets into your system. Their information and passwords could be recycled at their new place of business or on social media where they were the victim of a hack.&nbsp;<\/p>\n\n\n\n<p>Now, think about all of that taking place in the pandemic era. Work from home, the shift to remote work, increased the strain of IT departments in every business. Infrastructures, systems, machines are all strained from the sheer number of people logging in from home. Think about that former employee and the type of access they have to your business, which now extends to their remote location. What happens if you don\u2019t do anything with that access? What happens if you just let them go and forget they were ever hired?<\/p>\n\n\n\n<p>A prime example of what can happen is showcased by the Post Rock Water District in Kansas. Earlier this month, Wyatt A. Travnichek, a former employee of the water facility, was indicted. He allegedly logged in to the public water system, remotely from his home, with the intention of shutting down safety processes that make the water safe to drink. The incident is said to have happened in March 2019, at which time Travnichek was an ex-employee. Part of his job duties while employed included logging in remotely to monitor the plant after hours.<\/p>\n\n\n\n<p>&#8220;On or about March 27, 2019, in the District of Kansas, the defendant, Wyatt Travnichek, knowingly tampered with a public drinking water system, namely the Ellsworth County Rural Water District No. 1,&#8221; <a href=\"https:\/\/interestingengineering.com\/a-22-year-old-logged-in-and-compromised-kansas-water-system-remotely\" target=\"_blank\" rel=\"noreferrer noopener\">prosecutors alleged<\/a>. &#8220;To wit: he logged in remotely to Post Rock Rural Water District\u2019s computer system and performed activities that shut down processes at the facility which affect the facility\u2019s cleaning and disinfecting procedures with the intention of harming the Ellsworth County Rural Water District No. 1.&#8221;<\/p>\n\n\n\n<p>Ask yourself if your business could withstand a situation such as this. In this case, people\u2019s lives were literally at stake. That may or may not be the situation for your business, but think about the impact someone like Travnichek could have with your business information. What damage could be done? Could a former employee with specific access steal proprietary information? Do you want to leave an open access point for hackers to exploit simply because you didn\u2019t reduce your surface area?&nbsp;<\/p>\n\n\n\n<p>The Kansas man faces a maximum of 25 years in prison and $500,000 in fines. A water plant isn\u2019t likely to go out of business anytime soon, but the same cannot be said for most small to medium sized businesses. You must protect your assets. Employee exit procedures are an area of security that is often missed simply due to a lack of knowledge or simple oversight. Don\u2019t make this mistake. If you have former employees whose access has not been removed, it\u2019s time to run through that list and make sure those credentials are blocked or removed and that they haven\u2019t been used. If they have, immediately treat it as an incident.<\/p>\n\n\n\n<p>More and more businesses are contemplating keeping at least a hybrid workforce post-pandemic. Even when using a VPN, it\u2019s not 100% preventive. It doesn\u2019t matter where your employees are working, if they leave or are let go, their information must be reviewed and adjusted appropriately.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.<\/p>\n","protected":false},"author":1,"featured_media":1784,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,14],"tags":[2078,36,2252,2254,2253,2255,557,17,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Employee Exit Procedures Are Vital to Security - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Employee Exit Procedures Are Vital to Security\" \/>\n<meta property=\"og:description\" content=\"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-16T20:06:03+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-16T20:06:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Employee Exit Procedures Are Vital to Security\",\"datePublished\":\"2021-04-16T20:06:03+00:00\",\"dateModified\":\"2021-04-16T20:06:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\"},\"wordCount\":816,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg\",\"keywords\":[\"Access Controls\",\"Business\",\"Credientials\",\"Employee exit procedures\",\"Exit Procedures\",\"Remote Access\",\"remote work\",\"Security\",\"technology\"],\"articleSection\":[\"Business\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\",\"name\":\"Employee Exit Procedures Are Vital to Security - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg\",\"datePublished\":\"2021-04-16T20:06:03+00:00\",\"dateModified\":\"2021-04-16T20:06:06+00:00\",\"description\":\"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg\",\"width\":2560,\"height\":1707,\"caption\":\"Business, career and placement concept - image from back of two employers sitting in office and shaking hand of young asian woman after successful negotiations or interview\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Employee Exit Procedures Are Vital to Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Employee Exit Procedures Are Vital to Security - PWV Consultants","description":"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/","og_locale":"en_US","og_type":"article","og_title":"Employee Exit Procedures Are Vital to Security","og_description":"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-04-16T20:06:03+00:00","article_modified_time":"2021-04-16T20:06:06+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Employee Exit Procedures Are Vital to Security","datePublished":"2021-04-16T20:06:03+00:00","dateModified":"2021-04-16T20:06:06+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/"},"wordCount":816,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg","keywords":["Access Controls","Business","Credientials","Employee exit procedures","Exit Procedures","Remote Access","remote work","Security","technology"],"articleSection":["Business","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/","url":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/","name":"Employee Exit Procedures Are Vital to Security - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg","datePublished":"2021-04-16T20:06:03+00:00","dateModified":"2021-04-16T20:06:06+00:00","description":"Employee exit procedures are vital to the security of your business. The era of remote work makes this impossible to ignore.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Employee-Exit-Interviews-scaled.jpeg","width":2560,"height":1707,"caption":"Business, career and placement concept - image from back of two employers sitting in office and shaking hand of young asian woman after successful negotiations or interview"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/employee-exit-procedures-are-vital-to-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Employee Exit Procedures Are Vital to Security"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1758"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1758"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1758\/revisions"}],"predecessor-version":[{"id":1785,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1758\/revisions\/1785"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1784"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1758"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1758"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1758"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}