{"id":732,"date":"2020-09-09T13:00:00","date_gmt":"2020-09-09T17:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=732"},"modified":"2020-09-07T15:03:29","modified_gmt":"2020-09-07T19:03:29","slug":"ethical-hacking-series-what-to-do-when-its-over","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/","title":{"rendered":"Ethical Hacking Series: What To Do When It&#8217;s Over"},"content":{"rendered":"\n<p>So far in this series, we\u2019ve discussed <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-is-ethical-hacking\/\" target=\"_blank\" rel=\"noreferrer noopener\">what ethical hacking is<\/a> and <a href=\"https:\/\/www.pwvconsultants.com\/blog\/?p=719\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">what to look for in someone you hire to test your code<\/a>. Those are the initial considerations when starting the ethical hacking process, but now the hacker is done and has data for you to review. What happens next is all up to you. While ethical hacking is part of compliance, it\u2019s not just a box to check off when testing is complete. You have to actually do something with the data yielded during the hacking process.<\/p>\n\n\n\n<p>A vanity test is a useless, expensive waste of money. You are essentially bringing someone in to break into your systems, hunt you down and kill your business. You want them to figure out all of the bad things that are hidden in your system that you don\u2019t know are there. Then you\u2019re going to sit on that data and do nothing with it so you can check a box and say you did the test. It keeps you in compliance, so maybe you avoid a fine, but it\u2019s really not doing you any good. And if something does happen, now you are actively negligent.<\/p>\n\n\n\n<p>What you SHOULD do, once you have that penetration tester and they\u2019ve gathered your data, is act on the intelligence you\u2019ve been given. You no longer have unknown problems, you have known problems that need to be fixed. Otherwise, you\u2019re just neglectful. The point of ethical hacking is to locate potential security problems, potential weak spots where an attacker could breach systems and gain access to sensitive information. So when you get data that tells you where those spots are, your first step should always be to address those areas and solidify the walls around sensitive data.<\/p>\n\n\n\n<p>Ethical hacking should be done often, even companies that are hyper-secure should have, at minimum, annual pen testing. Someone should come in once a year and spend a few weeks really trying to go after you. It\u2019s one of the safest procedures you can have, as long as you take the intelligence and data from ethical hacking and do something with it.<\/p>\n\n\n\n<p>Aside from it being a waste of money when you don\u2019t react to the data you\u2019re given, it\u2019s also a major security problem. As alluded to above, if a breach would occur at one of these weak spots, you are now negligent. Not only does a security breach cost you money in time, labor, legal fees, reparations and lost revenue due to loss of trust, but now you\u2019re going to get fines too. Compliance bodies do not take kindly to ignoring known issues. Look at Capital One, fined $80 million for ignoring a known security problem which someone exploited and exposed millions of customers information. Do you have the assets to cover something like that? The vast majority of businesses do not have those resources.<\/p>\n\n\n\n<p>If you look at the recent attacks on Twitter, Garmin, Reddit and YouTube, you will see just how bad things can get. And these are giant corporations with the resources to cover whatever madness is thrown at them. Small to medium sized businesses, and really most large businesses, really do not have the capital or assets to cover the expense of being breached. Remember, that Capital One fine is only the fine from the compliance body, it doesn\u2019t include any reparations, legal fees or loss of revenue due to customers closing accounts. The number grows exponentially with those things included.<\/p>\n\n\n\n<p>Don\u2019t be actively negligent. When you do an ethical hack, which you should do at least on an annual basis if not more, respond to the data you are given. Make the necessary changes to ensure your product is secure and stable. This is the only way to ensure your business stays alive and sensitive information remains protected.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.<\/p>\n","protected":false},"author":1,"featured_media":758,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[599,5,959,4],"tags":[709,602,30,686,31,926,1674,539,40,575,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Ethical Hacking Series: What To Do When It&#039;s Over - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ethical Hacking Series: What To Do When It&#039;s Over\" \/>\n<meta property=\"og:description\" content=\"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-09T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-07T19:03:29+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"853\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Ethical Hacking Series: What To Do When It&#8217;s Over\",\"datePublished\":\"2020-09-09T17:00:00+00:00\",\"dateModified\":\"2020-09-07T19:03:29+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\"},\"wordCount\":659,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg\",\"keywords\":[\"breach\",\"Coding\",\"Compliance\",\"cyber sec\",\"Cybersecurity\",\"data breach\",\"ethical hacking\",\"hacking\",\"Info Sec\",\"Information Security\",\"Security\"],\"articleSection\":[\"Coding\",\"Cyber Security\",\"Data Breaches\",\"Information Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\",\"name\":\"Ethical Hacking Series: What To Do When It's Over - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg\",\"datePublished\":\"2020-09-09T17:00:00+00:00\",\"dateModified\":\"2020-09-07T19:03:29+00:00\",\"description\":\"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg\",\"width\":1280,\"height\":853,\"caption\":\"Image by Darwin Laganzon from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ethical Hacking Series: What To Do When It&#8217;s Over\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Ethical Hacking Series: What To Do When It's Over - PWV Consultants","description":"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/","og_locale":"en_US","og_type":"article","og_title":"Ethical Hacking Series: What To Do When It's Over","og_description":"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-09T17:00:00+00:00","article_modified_time":"2020-09-07T19:03:29+00:00","og_image":[{"width":1280,"height":853,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Ethical Hacking Series: What To Do When It&#8217;s Over","datePublished":"2020-09-09T17:00:00+00:00","dateModified":"2020-09-07T19:03:29+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/"},"wordCount":659,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg","keywords":["breach","Coding","Compliance","cyber sec","Cybersecurity","data breach","ethical hacking","hacking","Info Sec","Information Security","Security"],"articleSection":["Coding","Cyber Security","Data Breaches","Information Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/","url":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/","name":"Ethical Hacking Series: What To Do When It's Over - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg","datePublished":"2020-09-09T17:00:00+00:00","dateModified":"2020-09-07T19:03:29+00:00","description":"Ethical hacking is a crucial and integral part of keeping your business secure and compliant. But you must do something with data yielded during testing.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Ethical-Hacking-Series-Make-it-Work-For-You.jpg","width":1280,"height":853,"caption":"Image by Darwin Laganzon from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/ethical-hacking-series-what-to-do-when-its-over\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ethical Hacking Series: What To Do When It&#8217;s Over"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/732"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=732"}],"version-history":[{"count":5,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/732\/revisions"}],"predecessor-version":[{"id":762,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/732\/revisions\/762"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/758"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=732"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=732"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=732"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}