{"id":399,"date":"2020-06-24T10:00:00","date_gmt":"2020-06-24T10:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=399"},"modified":"2020-06-23T01:02:20","modified_gmt":"2020-06-23T01:02:20","slug":"keeping-up-with-hackers-changing-tactics","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/","title":{"rendered":"Keeping Up With Hackers Changing Tactics"},"content":{"rendered":"\n<p>Technology changes every day. There are advancements, innovations, people developing better ways of doing things. People themselves are learning to think and behave more efficiently because machines are taking over tedious tasks. Every startup business is reliant on technology to function. Processing credit cards, having a presence on social media, owning a website. All of these things are necessary to stay competitive in today\u2019s market. But this also means that bad actors and hackers are changing too. Hackers changing tactics are evolving and no one is free of an attack. It is important to understand these changes, to know what new tactics are being employed, and to respond properly.<\/p>\n\n\n\n<p>It is known that phishing schemes are the most common vector of a cyber attack, but it isn\u2019t the only one. Today, social engineering is the second most common threat employed by hackers. This entails engineering on social media, calling people and asking for favors and asking questions, and even looking through physical garbage to get information. It could be pretending to be a client or pretending to be someone interviewing for a job. It may seem paranoid to think this way, but when it comes to cybersecurity, access is the key to gaining more access. The more access a hacker can gain, the more information they can steal, the more they can exploit the business they have targeted.<\/p>\n\n\n\n<p>In order to protect against the ever-changing tactics, one of the best things you can do, besides follow the four protections <a href=\"https:\/\/www.pwvconsultants.com\/blog\/data-breaches-are-a-major-cybersecurity-threat\/\" target=\"_blank\" rel=\"noreferrer noopener\">outlined in a previous article<\/a>, is to ensure that all software and hardware patching is up to date. Companies are more likely to be hit by something that\u2019s been around for a year because they didn\u2019t patch something than to be hit by something on day zero. For example, SQL injection has bounced around the OWASP top 10 for 10 years and it\u2019s still there. Employ good coding practices by utilizing the OWASP to 10 and ensuring proper protections are in place. Until companies catch up and stop allowing SQL injection to be exploited, it will continue to be a common vector. Same goes for anything else on that list.<\/p>\n\n\n\n<p>Companies of all kinds are attacked all the time, every day. Not just large corporations, but everything from tiny mom and pop shops to giant corporations and governments. Attacks are indiscriminate, with the goal being to gain access somewhere, anywhere. The attackers do not care if you\u2019re a startup or a legacy business, if you\u2019ve been around for five minutes or hundreds of years. The goal is information gathering. The more information they can gather, the more they believe they can make on the dark web or black market or wherever they sell their thefted data.<\/p>\n\n\n\n<p>Data breaches are common. Some you hear about in the media when millions of people are affected. Others you don\u2019t know happen because no one was exposed and the business did their <a href=\"https:\/\/www.pwvconsultants.com\/blog\/components-of-successful-incident-response-teams\/\" target=\"_blank\" rel=\"noreferrer noopener\">due diligence in responding<\/a>. Having a dedicated IT team to monitor and respond to such attacks is every bit as important as knowing what hackers are doing to circumvent business protections. Their ever-changing tactics make it hard to keep up, which is why reporting is important so that other companies can be aware when a new threat emerges.<\/p>\n\n\n\n<p>Hackers changing tactics isn&#8217;t goinng to change as businesses catch up and protect new weaknesses. Be sure to set up your protections, to rely on the advice and information your IT team learns and have an incident response team set up to handle breaches. Mitigating your risk early is a key piece in protecting your business assets, proprietary data, customer and client information.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.<\/p>\n","protected":false},"author":1,"featured_media":415,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,959,4,14],"tags":[43,25,31,928,539,575,927,41,969],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Keeping Up With Hackers Changing Tactics - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Up With Hackers Changing Tactics\" \/>\n<meta property=\"og:description\" content=\"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-24T10:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-23T01:02:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Keeping Up With Hackers Changing Tactics\",\"datePublished\":\"2020-06-24T10:00:00+00:00\",\"dateModified\":\"2020-06-23T01:02:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\"},\"wordCount\":619,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg\",\"keywords\":[\"Attack\",\"cyber attack\",\"Cybersecurity\",\"hackers\",\"hacking\",\"Information Security\",\"phishing schemees\",\"Social Engineering\",\"tactics\"],\"articleSection\":[\"Cyber Security\",\"Data Breaches\",\"Information Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\",\"name\":\"Keeping Up With Hackers Changing Tactics - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg\",\"datePublished\":\"2020-06-24T10:00:00+00:00\",\"dateModified\":\"2020-06-23T01:02:20+00:00\",\"description\":\"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"Photo by ThisIsEngineering from Pexels\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Keeping Up With Hackers Changing Tactics\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Keeping Up With Hackers Changing Tactics - PWV Consultants","description":"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Up With Hackers Changing Tactics","og_description":"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-06-24T10:00:00+00:00","article_modified_time":"2020-06-23T01:02:20+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Keeping Up With Hackers Changing Tactics","datePublished":"2020-06-24T10:00:00+00:00","dateModified":"2020-06-23T01:02:20+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/"},"wordCount":619,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg","keywords":["Attack","cyber attack","Cybersecurity","hackers","hacking","Information Security","phishing schemees","Social Engineering","tactics"],"articleSection":["Cyber Security","Data Breaches","Information Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/","url":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/","name":"Keeping Up With Hackers Changing Tactics - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg","datePublished":"2020-06-24T10:00:00+00:00","dateModified":"2020-06-23T01:02:20+00:00","description":"Hackers changing tactics on a regular basis makes keeping up hard. Setting up protections and proper response are important measures.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/06\/Keeping-Up-With-Hackers-Changing-Tactics-scaled.jpg","width":2560,"height":1707,"caption":"Photo by ThisIsEngineering from Pexels"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/keeping-up-with-hackers-changing-tactics\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Keeping Up With Hackers Changing Tactics"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/399"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=399"}],"version-history":[{"count":7,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/399\/revisions"}],"predecessor-version":[{"id":423,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/399\/revisions\/423"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/415"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}