{"id":734,"date":"2020-09-10T12:00:00","date_gmt":"2020-09-10T16:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=734"},"modified":"2020-09-07T15:20:33","modified_gmt":"2020-09-07T19:20:33","slug":"shadow-it-series-what-it-is-why-it-happens","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/","title":{"rendered":"Shadow IT Series: What It Is &#038; Why It Happens"},"content":{"rendered":"\n<p>Shadow IT technologies are a plague to IT departments worldwide, especially the parts of the department assigned to security. Why is this a problem? Because when an employee downloads or decides to use a tool that the IT department doesn\u2019t know about, it can wreak havoc on company systems and create weak spots they don\u2019t know exist. Those weak spots are easy targets for hackers looking to gain access.<\/p>\n\n\n\n<p>Before you can recognize shadow IT as a problem, you have to know what it is. According to <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/what-is-shadow-it.html\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">Cisco<\/a>, \u201cShadow IT is the use of IT-related hardware or software by a department or individual without the knowledge of the IT or security group within the organization. It can encompass cloud services, software, and hardware.\u201d<\/p>\n\n\n\n<p>The rapid adoption of <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-most-overlooked-cloud-security-protocols\/\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">cloud-based services<\/a> is a big concern today. Users are more comfortable downloading and using apps and services from the cloud to help them do their job, which is evidenced by increasing rates of shadow IT. Information technology has become consumerized, making lay people more at ease with using it and more likely to try things they might not have tried a few years ago. So why do people turn to shadow IT, what makes them seek out an app or service to assist them with their work?<\/p>\n\n\n\n<p>There are three real reasons employees turn to shadow IT:<\/p>\n\n\n\n<ol type=\"1\"><li>The tools given to them are not adequate or industry standard for doing their job<\/li><li>The tools they are provided with have been adapted or constrained. For example, features have been removed for security or budget without correct analysis of impact to users. Or the process of getting their tools is difficult and time delayed. If you need a tool to finish a task today, but you have to put in a request and wait a week to get that tool, you\u2019re going to turn to shadow IT.<\/li><li>The tools needed aren\u2019t offered in any form, or getting them is so difficult and convoluted that employees don\u2019t know how to get what is offered.<\/li><\/ol>\n\n\n\n<p>Underneath these three reasons for turning to shadow IT, there are two common security\/tech principles to consider. These principles are in the front of our minds with consumer-facing products, but tend to get ignored for internal processes. One, if a process is too complex, a user (employee in this case) will give up or find another way that is simpler. Two, creating a user-centric design. Business owners tend to make budget and security decisions for internal tools without considering the impact on the employees.<\/p>\n\n\n\n<p>What happens is that business owners fall into a trap of false equivalency. They think that they are making the best decisions for the business, which they might be with regard to budget and security, but they end up hampering their employees. When that happens, efficiency drops, productivity goes down and profits with them. Think of it like this, if all you need to do is hammer a nail, it generally doesn\u2019t matter what kind of hammer you have. You can hammer with a carpenter hammer, claw hammer, ball-peen, sledge or mallet. Any of those will work. But the moment you need to remove the nail, you definitely want the claw hammer.<\/p>\n\n\n\n<p>If you find that your employees are turning to shadow IT, take a look at the apps and services they are downloading. Try to pinpoint what your employees are looking for that they aren\u2019t getting from you. See if there\u2019s a better way to get them what they need that\u2019s secure and safe. Your business depends not only on the security of products being used, but also the efficiency and productivity of your employees.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.<\/p>\n","protected":false},"author":1,"featured_media":764,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,4,958,14],"tags":[1681,18,1683,575,1390,1680,1682,1679,1603,571,1684],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shadow IT Series: What It Is &amp; Why It Happens - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT Series: What It Is &amp; Why It Happens\" \/>\n<meta property=\"og:description\" content=\"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-10T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-07T19:20:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1152\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Shadow IT Series: What It Is &#038; Why It Happens\",\"datePublished\":\"2020-09-10T16:00:00+00:00\",\"dateModified\":\"2020-09-07T19:20:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\"},\"wordCount\":627,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg\",\"keywords\":[\"apps\",\"Cloud\",\"hardware\",\"Information Security\",\"Information Technology\",\"IT\",\"services\",\"Shadow It\",\"software\",\"technology\",\"tools\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Information Security\",\"Information Technology\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\",\"name\":\"Shadow IT Series: What It Is & Why It Happens - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg\",\"datePublished\":\"2020-09-10T16:00:00+00:00\",\"dateModified\":\"2020-09-07T19:20:33+00:00\",\"description\":\"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg\",\"width\":1920,\"height\":1152,\"caption\":\"Image by Pete Linforth from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow IT Series: What It Is &#038; Why It Happens\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shadow IT Series: What It Is & Why It Happens - PWV Consultants","description":"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/","og_locale":"en_US","og_type":"article","og_title":"Shadow IT Series: What It Is & Why It Happens","og_description":"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-10T16:00:00+00:00","article_modified_time":"2020-09-07T19:20:33+00:00","og_image":[{"width":1920,"height":1152,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Shadow IT Series: What It Is &#038; Why It Happens","datePublished":"2020-09-10T16:00:00+00:00","dateModified":"2020-09-07T19:20:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/"},"wordCount":627,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg","keywords":["apps","Cloud","hardware","Information Security","Information Technology","IT","services","Shadow It","software","technology","tools"],"articleSection":["Application Security","Cyber Security","Information Security","Information Technology","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/","url":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/","name":"Shadow IT Series: What It Is & Why It Happens - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg","datePublished":"2020-09-10T16:00:00+00:00","dateModified":"2020-09-07T19:20:33+00:00","description":"Business owners often cut features from apps used by employees for budget reasons. This often results in the use of shadow IT, creating a security problem.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-What-It-Is-and-Why-It-Happens.jpg","width":1920,"height":1152,"caption":"Image by Pete Linforth from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-what-it-is-why-it-happens\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Shadow IT Series: What It Is &#038; Why It Happens"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/734"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=734"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/734\/revisions"}],"predecessor-version":[{"id":765,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/734\/revisions\/765"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/764"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}