{"id":736,"date":"2020-09-11T12:00:00","date_gmt":"2020-09-11T16:00:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=736"},"modified":"2020-09-07T15:36:28","modified_gmt":"2020-09-07T19:36:28","slug":"shadow-it-series-determining-threat-level-potential-value","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/","title":{"rendered":"Shadow IT Series: Threat Level vs. Value Potential"},"content":{"rendered":"\n<p>Shadow IT is a problem for many companies. Employees downloading apps and services without the knowledge of your IT department is a huge security risk. Previously, we covered <a href=\"https:\/\/www.pwvconsultants.com\/blog\/?p=734\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">what it is and why it happens<\/a>. Now it\u2019s time to discuss how to determine the threat level of the apps and services downloaded, as well as the potential value of these items.<\/p>\n\n\n\n<p>In an ideal world, you have a system in place where there isn\u2019t really shadow IT, but instead you have pilot IT. Pilot IT is when you allow people to introduce tools into your ecosystem in a transparent way. Once the tool is introduced and registered, it is scanned and evaluated for security standards and licensing. If everything passes, it can stay.<\/p>\n\n\n\n<p>If you don\u2019t have a pilot program in place, the alternative is to regularly scan all of the systems in your network. Make a list of installs and create a shadow IT list. Then scan through the installs and rely on your endpoint protection. The problem here is that this system will cause you to chase your tail. It perpetuates the negativity around shadow IT and should only be in place while transitioning to pilot IT.<\/p>\n\n\n\n<p>Once you have assessed the potential threat level of an app or service that was installed by an employee, and you determine that it is safe, you then need to determine the value of this tool. Is this something you already provide for your employees but no one can get to it? Is this something you used to provide and took away? Or is this something new that you hadn\u2019t considered? Once you determine the value of the app or service, you can decide if you want to make it a permanent tool for your employees.<\/p>\n\n\n\n<p>The best way to determine the value of a tool is to ask the users. Ask your employees if they find the tool helpful. No product manager or UX designer worth their salt would make decisions isolated from their users. So, if your employees are using tools not provided by you, there has to be a reason. Most people do not intentionally set out to aggravate your security and procurement staff. You must find out why your employees have turned to this tool, where the gaps are. In fact, when you have new proposed tools, ask your employees to try out their options. Ensure that this tool is effective and useful for what they do, and make sure that your process for getting a tool is not overly complicated.<\/p>\n\n\n\n<p>When your employees turn to shadow IT, it\u2019s for a reason. Anything they download can be a suitable candidate for approved business use. You definitely want ease of use to be extended to your employees. When you make their jobs easier, they will be more efficient, happier and you will have higher retention rates and profits. Give your employees what they need, the cost of spending a little extra on a better tool or on securing a tool will often be balanced out by the efficiency of your employees. Efficient employees make for an efficient business, and an efficient business that is secure has a much higher chance of being successful.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Employees turn to shadow IT when they don&#8217;t have the tool they need. After working out the threat level, look at the value potential of apps they are using.<\/p>\n","protected":false},"author":1,"featured_media":767,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[10,5,4,958],"tags":[1681,686,31,40,575,1390,1687,1682,1679,1685,1686],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Shadow IT Series: Threat Level vs. Value Potential - PWV Consultants<\/title>\n<meta name=\"description\" content=\"Employees turn to shadow IT when they don&#039;t have the tool they need. After working out the threat level, look at the value potential of apps they are using.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Shadow IT Series: Threat Level vs. Value Potential\" \/>\n<meta property=\"og:description\" content=\"Employees turn to shadow IT when they don&#039;t have the tool they need. After working out the threat level, look at the value potential of apps they are using.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-09-11T16:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-07T19:36:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"Shadow IT Series: Threat Level vs. Value Potential\",\"datePublished\":\"2020-09-11T16:00:00+00:00\",\"dateModified\":\"2020-09-07T19:36:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\"},\"wordCount\":548,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg\",\"keywords\":[\"apps\",\"cyber sec\",\"Cybersecurity\",\"Info Sec\",\"Information Security\",\"Information Technology\",\"pilot IT\",\"services\",\"Shadow It\",\"threat\",\"value\"],\"articleSection\":[\"Application Security\",\"Cyber Security\",\"Information Security\",\"Information Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\",\"name\":\"Shadow IT Series: Threat Level vs. Value Potential - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg\",\"datePublished\":\"2020-09-11T16:00:00+00:00\",\"dateModified\":\"2020-09-07T19:36:28+00:00\",\"description\":\"Employees turn to shadow IT when they don't have the tool they need. After working out the threat level, look at the value potential of apps they are using.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg\",\"width\":1920,\"height\":1120,\"caption\":\"Image by Pete Linforth from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Shadow IT Series: Threat Level vs. Value Potential\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Shadow IT Series: Threat Level vs. Value Potential - PWV Consultants","description":"Employees turn to shadow IT when they don't have the tool they need. After working out the threat level, look at the value potential of apps they are using.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/","og_locale":"en_US","og_type":"article","og_title":"Shadow IT Series: Threat Level vs. Value Potential","og_description":"Employees turn to shadow IT when they don't have the tool they need. After working out the threat level, look at the value potential of apps they are using.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-09-11T16:00:00+00:00","article_modified_time":"2020-09-07T19:36:28+00:00","og_image":[{"width":1920,"height":1120,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"Shadow IT Series: Threat Level vs. Value Potential","datePublished":"2020-09-11T16:00:00+00:00","dateModified":"2020-09-07T19:36:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/"},"wordCount":548,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg","keywords":["apps","cyber sec","Cybersecurity","Info Sec","Information Security","Information Technology","pilot IT","services","Shadow It","threat","value"],"articleSection":["Application Security","Cyber Security","Information Security","Information Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/","url":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/","name":"Shadow IT Series: Threat Level vs. Value Potential - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg","datePublished":"2020-09-11T16:00:00+00:00","dateModified":"2020-09-07T19:36:28+00:00","description":"Employees turn to shadow IT when they don't have the tool they need. After working out the threat level, look at the value potential of apps they are using.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/09\/Shadow-IT-Series-Determining-Threat-Level-and-Value-Potential.jpg","width":1920,"height":1120,"caption":"Image by Pete Linforth from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/shadow-it-series-determining-threat-level-potential-value\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Shadow IT Series: Threat Level vs. Value Potential"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/736"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=736"}],"version-history":[{"count":2,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/736\/revisions"}],"predecessor-version":[{"id":768,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/736\/revisions\/768"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/767"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=736"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=736"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=736"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}