{"id":1828,"date":"2021-04-28T14:47:39","date_gmt":"2021-04-28T18:47:39","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=1828"},"modified":"2021-04-28T14:47:42","modified_gmt":"2021-04-28T18:47:42","slug":"your-business-is-as-secure-as-you-make-it","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/","title":{"rendered":"Your Business is as Secure as You Make It"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\" id=\"h-security-is-a-top-concern-for-businesses-today-it-s-important-to-remember-that-your-business-is-only-as-secure-as-you-make-it\">Security is a top concern for businesses today. It&#8217;s important to remember that your business is only as secure as you make it.<\/h2>\n\n\n\n<p>Businesses today have a laundry list of things to consider when making decisions. One of the top concerns for businesses around the world today is security. Security means protecting not just proprietary business information, but keeping employee information and customer data away from prying eyes. There have been an increase in cyberattacks of late, and no sector of business is unaffected. Recently, it was even discovered that blockchain, previously and erroneously thought to be unhackable, has proven to be hackable time and time again. <\/p>\n\n\n\n<p>Blockchain is a complicated piece of technology, a way to secure your information in a specific way that is unlikely to be duplicated. According to <a href=\"https:\/\/www.technologyreview.com\/2019\/02\/19\/239592\/once-hailed-as-unhackable-blockchains-are-now-getting-hacked\/\" target=\"_blank\" rel=\"noreferrer noopener\">MIT Technology Review<\/a>, \u201cA blockchain is a cryptographic database maintained by a network of computers, each of which stores a copy of the most up-to-date version. A blockchain protocol is a set of rules that dictate how the computers in the network, called nodes, should verify new transactions and add them to the database. The protocol employs cryptography, game theory, and economics to create incentives for the nodes to work toward securing the network instead of attacking it for personal gain. If set up correctly, this system can make it extremely difficult and expensive to add false transactions but relatively easy to verify valid ones.\u201d<\/p>\n\n\n\n<p><a href=\"https:\/\/www.pwvconsultants.com\/blog\/blockchain-explained-how-it-works\/\" target=\"_blank\" rel=\"noreferrer noopener\">We\u2019ve discussed blockchain in the past<\/a>, the benefits of its security features and how <a href=\"https:\/\/www.pwvconsultants.com\/blog\/how-distributed-ledger-compliments-blockchain\/\" target=\"_blank\" rel=\"noreferrer noopener\">distributed ledger can strengthen that security<\/a>. Cryptocurrency uses blockchain to ensure transactions are secure and to keep a record of those transactions. Cryptocurrency exchanges, where people buy, sell and trade cryptocurrency, have recently come under attack. Coinbase is one such exchange, and in January it noticed odd happenings in Ethereum Classic, marking the first attack on a top-20 currency. Hackers gained control of over half of the network\u2019s computing power and used it to rewrite transaction history. In doing so, the attackers were able to reuse currency which had already been used, known as a \u201cdouble spend.\u201d The hackers made off with over $1 million. Coinbase indicated that no actual cryptocurrency was stolen, but another exchange called Gate.io lost $200,000 in the attack.<\/p>\n\n\n\n<p>When set up and implemented properly, blockchain is an effective method of securing data and keeping a transaction history. Smart contracts also use blockchain because blockchain requires that tasks be completed in sequence. So a smart contract can\u2019t move forward without the items completed in the right order. However, blockchain is not infallible, nothing is, so it\u2019s important to have other security methods in place as well.&nbsp;<\/p>\n\n\n\n<p>Your business is only as secure as you make it. Every business should have layers of security so that when a weak spot in the system is found, another layer can cover the hole. The blockchain hacks don&#8217;t just apply to cryptocurrency or smart contracts, there are other uses for blockchain in different industries. Any business that uses blockchain should heavily review these attacks and make sure their code is updated with the most recent security measures. While reviewing that code, teams should ensure the integrity of the data to ensure it has not been tampered with or altered in any way. It may not be a small task, but if you want to ensure you aren\u2019t on the hook for a breach you didn\u2019t know about, it\u2019s best to find out sooner than later.<\/p>\n\n\n\n<p>Blockchain is complicated. Having layers of security that all work together and function is complicated. Don\u2019t leave these things to chance, bring in a security expert who can help ensure success, someone who can train your team or be available to assist should problems arise.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cryptocurrency exchange platforms have come under attack. It&#8217;s a fresh reminder that your business is only as secure as you make it.<\/p>\n","protected":false},"author":1,"featured_media":1842,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1969,14],"tags":[1923,36,2281,1912,2283,1915,2282,17,571],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Your Business is as Secure as You Make It - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Cryptocurrency exchange platforms have come under attack. It&#039;s a fresh reminder that your business is only as secure as you make it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Your Business is as Secure as You Make It\" \/>\n<meta property=\"og:description\" content=\"Cryptocurrency exchange platforms have come under attack. It&#039;s a fresh reminder that your business is only as secure as you make it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-28T18:47:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-28T18:47:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1440\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Your Business is as Secure as You Make It\",\"datePublished\":\"2021-04-28T18:47:39+00:00\",\"dateModified\":\"2021-04-28T18:47:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\"},\"wordCount\":638,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg\",\"keywords\":[\"blockchain\",\"Business\",\"Coinbase\",\"cryptocurrency\",\"Cryptocurrency Exchange\",\"Ethereum\",\"Ethereum Classic\",\"Security\",\"technology\"],\"articleSection\":[\"Business\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\",\"name\":\"Your Business is as Secure as You Make It - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg\",\"datePublished\":\"2021-04-28T18:47:39+00:00\",\"dateModified\":\"2021-04-28T18:47:42+00:00\",\"description\":\"Cryptocurrency exchange platforms have come under attack. It's a fresh reminder that your business is only as secure as you make it.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg\",\"width\":2560,\"height\":1440,\"caption\":\"Block chain concept - Chain consists of network connections . 3d rendering\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Your Business is as Secure as You Make It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Your Business is as Secure as You Make It - PWV Consultants","description":"Cryptocurrency exchange platforms have come under attack. It's a fresh reminder that your business is only as secure as you make it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/","og_locale":"en_US","og_type":"article","og_title":"Your Business is as Secure as You Make It","og_description":"Cryptocurrency exchange platforms have come under attack. It's a fresh reminder that your business is only as secure as you make it.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2021-04-28T18:47:39+00:00","article_modified_time":"2021-04-28T18:47:42+00:00","og_image":[{"width":2560,"height":1440,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Your Business is as Secure as You Make It","datePublished":"2021-04-28T18:47:39+00:00","dateModified":"2021-04-28T18:47:42+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/"},"wordCount":638,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg","keywords":["blockchain","Business","Coinbase","cryptocurrency","Cryptocurrency Exchange","Ethereum","Ethereum Classic","Security","technology"],"articleSection":["Business","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/","url":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/","name":"Your Business is as Secure as You Make It - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg","datePublished":"2021-04-28T18:47:39+00:00","dateModified":"2021-04-28T18:47:42+00:00","description":"Cryptocurrency exchange platforms have come under attack. It's a fresh reminder that your business is only as secure as you make it.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2021\/04\/Your-Business-is-as-Secure-as-You-Make-It-scaled.jpeg","width":2560,"height":1440,"caption":"Block chain concept - Chain consists of network connections . 3d rendering"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/your-business-is-as-secure-as-you-make-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Your Business is as Secure as You Make It"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1828"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=1828"}],"version-history":[{"count":4,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1828\/revisions"}],"predecessor-version":[{"id":1843,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/1828\/revisions\/1843"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/1842"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=1828"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=1828"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=1828"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}