{"id":905,"date":"2020-10-02T18:30:00","date_gmt":"2020-10-02T22:30:00","guid":{"rendered":"https:\/\/www.pwvconsultants.com\/blog\/?p=905"},"modified":"2020-10-02T18:29:53","modified_gmt":"2020-10-02T22:29:53","slug":"covid-19-transmission-provides-cybersecurity-insight","status":"publish","type":"post","link":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/","title":{"rendered":"COVID-19 Transmission Provides Cybersecurity Insight"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">US President Donald Trump was recently diagnosed with COVID-19. How he contracted the virus illustrates that anything is hackable.<\/h2>\n\n\n\n<p>Often, people ask if certain apps, websites or services are safe to use. Will my information be private? Will my data be logged? If so, who has access to that data? Will my data be shared with a third party? What steps can I take to protect my personal and private information? All of these questions fall under the cybersecurity umbrella. While we can take precautions and practice good cyber-hygiene, nothing is 100% secure.&nbsp;<\/p>\n\n\n\n<p>Most people won\u2019t want to hear that and they likely don\u2019t believe it. They think their information is perfectly safe in the cloud or wherever that information is stored. The truth is, while those places might have tight security, anything can be hacked if someone has the proper set of skills, tools and time.<\/p>\n\n\n\n<p>A really great way to illustrate this point is with the COVID-19 pandemic. Globally, humans are taking precautions. We\u2019re social distancing, wearing masks and gloves, washing our hands many times throughout the day and limiting our exposure to people who could be sick. People who have underlying medical conditions are isolating themselves while people who experience health privilege are willing to take more risks. This is how the world functions with cybersecurity as well, we all do what we think is best for our businesses and ourselves to keep our information safe.<\/p>\n\n\n\n<p>But yesterday, <a href=\"https:\/\/www.cnet.com\/news\/donald-trump-headed-to-hospital-out-of-caution-after-testing-positive-for-covid-19\/\" target=\"_blank\" rel=\"noreferrer noopener\">United States President Donald Trump was diagnosed with COVID-19<\/a>. This is someone who is highly protected, tested regularly and is taking precautions. People who sit in the first several rows at his rallies are tested before they\u2019re allowed to be that close to him. He is always surrounded by secret service personnel to keep people at a distance. He is one of the most highly protected people on the planet. And he still got COVID. How? One of his close personal aides contracted the virus and spread it to him.<\/p>\n\n\n\n<p>This is EXACTLY how a cyber-attack works. The nefarious program or hacker trying to gain access to sensitive information can try to penetrate the walls you have set up. Maybe they get in that way through a weakness, maybe your security is solid enough to keep most attacks at bay. But when that hacker gains insider information and steals credentials, they can slip right in and do serious damage. Just like COVID-19.<\/p>\n\n\n\n<p>We\u2019ve said before, access is the first step. It doesn\u2019t matter where that access is, if it\u2019s the public Wi-Fi network or something else, once an attacker has access, they can get anywhere. It\u2019s like scoping out someone\u2019s medicine cabinet in their bathroom, once you\u2019re in there, you learn a lot about that person. And once you ask to go to the bathroom, you then can scope out the rest of the house without anyone questioning why you are there.<\/p>\n\n\n\n<p>The point we\u2019re trying to make here is that it really doesn\u2019t matter how secure you think you or your business are, you can always be hacked. If the President of the United States can get COVID-19 from someone he works with, then an attacker can get access to your systems simply by hacking one of your employees and getting their credentials. Set <a href=\"https:\/\/www.pwvconsultants.com\/blog\/the-importance-of-iam-controls\/\" target=\"_blank\" rel=\"noreferrer noopener\">proper IAM controls<\/a> using least privilege, <a href=\"https:\/\/www.pwvconsultants.com\/blog\/securing-data-with-multifactor-authentication\/\" target=\"_blank\" rel=\"noreferrer noopener\">utilize MFA,<\/a> reduce your surface area for an attacker to exploit. As with most crime, the criminals perpetuating these attacks want easy targets. They want to grab and go or hit places that aren\u2019t paying attention to security. Don\u2019t make it easy for them, and if you\u2019re unsure if your security is where it should be, hire or consult an expert to help!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump&#8217;s recent diagnosis is a prime example of how cyber-attacks work.<\/p>\n","protected":false},"author":1,"featured_media":909,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[5,14],"tags":[54,1852,1854,1853,564,686,31,1504,1855,1856,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v22.2 (Yoast SEO v22.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>COVID-19 Transmission Provides Cybersecurity Insight - PWV Consultants<\/title>\n<meta name=\"description\" content=\"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump&#039;s recent diagnosis is a prime example of how cyber-attacks work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"COVID-19 Transmission Provides Cybersecurity Insight\" \/>\n<meta property=\"og:description\" content=\"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump&#039;s recent diagnosis is a prime example of how cyber-attacks work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\" \/>\n<meta property=\"og:site_name\" content=\"PWV Consultants\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-02T22:30:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-02T22:29:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1080\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Pieter VanIperen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:site\" content=\"@PWV_Consultants\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Pieter VanIperen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\"},\"author\":{\"name\":\"Pieter VanIperen\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\"},\"headline\":\"COVID-19 Transmission Provides Cybersecurity Insight\",\"datePublished\":\"2020-10-02T22:30:00+00:00\",\"dateModified\":\"2020-10-02T22:29:53+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\"},\"wordCount\":635,\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg\",\"keywords\":[\"Access\",\"coronavirus\",\"COVID\",\"COVID-19\",\"COVID19\",\"cyber sec\",\"Cybersecurity\",\"Donald Trump\",\"POTUS\",\"President\",\"Security\"],\"articleSection\":[\"Cyber Security\",\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\",\"name\":\"COVID-19 Transmission Provides Cybersecurity Insight - PWV Consultants\",\"isPartOf\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg\",\"datePublished\":\"2020-10-02T22:30:00+00:00\",\"dateModified\":\"2020-10-02T22:29:53+00:00\",\"description\":\"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump's recent diagnosis is a prime example of how cyber-attacks work.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg\",\"width\":1920,\"height\":1080,\"caption\":\"Image by Tumisu from Pixabay\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pwvconsultants.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"COVID-19 Transmission Provides Cybersecurity Insight\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#website\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"name\":\"PWV Consultants\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#organization\",\"name\":\"PWV Consultants\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"contentUrl\":\"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png\",\"width\":98,\"height\":84,\"caption\":\"PWV Consultants\"},\"image\":{\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964\",\"https:\/\/twitter.com\/PWV_Consultants\",\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4\",\"name\":\"Pieter VanIperen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g\",\"caption\":\"Pieter VanIperen\"},\"description\":\"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/pwv-consultants\"]}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"COVID-19 Transmission Provides Cybersecurity Insight - PWV Consultants","description":"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump's recent diagnosis is a prime example of how cyber-attacks work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/","og_locale":"en_US","og_type":"article","og_title":"COVID-19 Transmission Provides Cybersecurity Insight","og_description":"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump's recent diagnosis is a prime example of how cyber-attacks work.","og_url":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/","og_site_name":"PWV Consultants","article_publisher":"https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","article_published_time":"2020-10-02T22:30:00+00:00","article_modified_time":"2020-10-02T22:29:53+00:00","og_image":[{"width":1920,"height":1080,"url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg","type":"image\/jpeg"}],"author":"Pieter VanIperen","twitter_card":"summary_large_image","twitter_creator":"@PWV_Consultants","twitter_site":"@PWV_Consultants","twitter_misc":{"Written by":"Pieter VanIperen","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#article","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/"},"author":{"name":"Pieter VanIperen","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4"},"headline":"COVID-19 Transmission Provides Cybersecurity Insight","datePublished":"2020-10-02T22:30:00+00:00","dateModified":"2020-10-02T22:29:53+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/"},"wordCount":635,"publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg","keywords":["Access","coronavirus","COVID","COVID-19","COVID19","cyber sec","Cybersecurity","Donald Trump","POTUS","President","Security"],"articleSection":["Cyber Security","Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/","url":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/","name":"COVID-19 Transmission Provides Cybersecurity Insight - PWV Consultants","isPartOf":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg","datePublished":"2020-10-02T22:30:00+00:00","dateModified":"2020-10-02T22:29:53+00:00","description":"COVID-19 presents an apt comparison to cyber-attacks. President Donald Trump's recent diagnosis is a prime example of how cyber-attacks work.","breadcrumb":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#primaryimage","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/10\/coronavirus-4914026_1920.jpg","width":1920,"height":1080,"caption":"Image by Tumisu from Pixabay"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pwvconsultants.com\/blog\/covid-19-transmission-provides-cybersecurity-insight\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pwvconsultants.com\/blog\/"},{"@type":"ListItem","position":2,"name":"COVID-19 Transmission Provides Cybersecurity Insight"}]},{"@type":"WebSite","@id":"https:\/\/www.pwvconsultants.com\/blog\/#website","url":"https:\/\/www.pwvconsultants.com\/blog\/","name":"PWV Consultants","description":"","publisher":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pwvconsultants.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pwvconsultants.com\/blog\/#organization","name":"PWV Consultants","url":"https:\/\/www.pwvconsultants.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","contentUrl":"https:\/\/www.pwvconsultants.com\/blog\/wp-content\/uploads\/2020\/04\/logo-alternate-e1585773530392.png","width":98,"height":84,"caption":"PWV Consultants"},"image":{"@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/PWV-Consultants-110444033947964","https:\/\/twitter.com\/PWV_Consultants","https:\/\/www.linkedin.com\/company\/pwv-consultants"]},{"@type":"Person","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/c15d5d40126a8ad906cb3067de95f8d4","name":"Pieter VanIperen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pwvconsultants.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b294918257a810803e2befc9a71b7bc?s=96&d=mm&r=g","caption":"Pieter VanIperen"},"description":"PWV Consultants is a boutique group of industry leaders and influencers from the digital tech, security and design industries that acts as trusted technical partners for many Fortune 500 companies, high-visibility startups, universities, defense agencies, and NGOs. Founded by 20-year software engineering veterans, who have founded or co-founder several companies. PWV experts act as a trusted advisors and mentors to numerous early stage startups, and have held the titles of software and software security executive, consultant and professor. PWV's expert consulting and advisory work spans several high impact industries in finance, media, medical tech, and defense contracting. PWV's founding experts also authored the highly influential precursor HAZL (jADE) programming language.","sameAs":["https:\/\/www.linkedin.com\/company\/pwv-consultants"]}]}},"_links":{"self":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/905"}],"collection":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":3,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"predecessor-version":[{"id":910,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/posts\/905\/revisions\/910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media\/909"}],"wp:attachment":[{"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pwvconsultants.com\/blog\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}