{"id":20320,"date":"2013-07-16T17:24:42","date_gmt":"2013-07-16T21:24:42","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=20320"},"modified":"2023-03-11T20:16:53","modified_gmt":"2023-03-12T00:16:53","slug":"strong-passwords","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/","title":{"rendered":"How To Create A Hacker-Proof Password"},"content":{"rendered":"<p>In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay your bills, check your bank account balance, look up medical records, and much, much more. To access this information, you must \u201clog in\u201d to your respective accounts, and as we all know, logging in requires two pieces of information\u2014username and password.<\/p>\n<p>We use passwords so frequently, that we often take them for granted. We lose sight of the fact that passwords are vital to the protection of our personal information, hence the term \u201cpassword-protected.\u201d Since passwords are used to access pretty much every detail of our lives, it would only make sense that we should aim to create one that no one could possibly guess\u2014especially cybercriminals.<\/p>\n<p>Unfortunately, some of us tend to get lazy when creating our passwords and we choose something very basic, or overly common. These mistakes increase our chances of being hacked, because easy passwords can be cracked in a matter of minutes, even by the most amature hacker.<\/p>\n<p>If you want to avoid getting hacked, you must be aware of the <a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2368484,00.asp\" target=\"_blank\" rel=\"noopener\">ins and outs of password protection<\/a>. To help you out, we\u2019ve created a list of tips and tricks you can use when creating new passwords, or changing your old ones. By following these five password best practices, you\u2019ll secure your privacy, while simultaneously avoiding the potentially devastating effects that will arise if a cybercriminal gets a hold of your personal information.<\/p>\n<h2>1. Password Length<\/h2>\n<p><a href=\"https:\/\/xkcd.com\/936\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-20323 lazyload\" title=\"Password Strength\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-680x552.png\" alt=\"\" width=\"680\" height=\"552\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-680x552.png 680w, https:\/\/www.andysowards.com\/blog\/assets\/password_strength-250x203.png 250w, https:\/\/www.andysowards.com\/blog\/assets\/password_strength-125x101.png 125w, https:\/\/www.andysowards.com\/blog\/assets\/password_strength-700x568.png 700w, https:\/\/www.andysowards.com\/blog\/assets\/password_strength.png 740w\" data-sizes=\"(max-width: 680px) 100vw, 680px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/552;\" \/><\/a><br \/>\n<em>Password Strength<\/em><\/p>\n<p>The largest percentage of passwords are six characters long, which is not long enough to be considered strong. The longer your password, the better, <a href=\"http:\/\/www.infoworld.com\/d\/security-central\/password-size-does-matter-531\" target=\"_blank\" rel=\"noopener\">and experts say<\/a> that eight characters is the <em>minimum<\/em> length required for a strong password.<\/p>\n<h2>2. Combination Of Characters<\/h2>\n<p><a href=\"http:\/\/www.businessinsider.com\/password-security-tips-2012-8?op=1\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-20324 lazyload\" title=\"8 Ways To Make Your Password Super Duper Secure\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/password-security-tips.jpg\" alt=\"\" width=\"620\" height=\"465\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/password-security-tips.jpg 620w, https:\/\/www.andysowards.com\/blog\/assets\/password-security-tips-250x187.jpg 250w, https:\/\/www.andysowards.com\/blog\/assets\/password-security-tips-125x93.jpg 125w\" data-sizes=\"(max-width: 620px) 100vw, 620px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 620px; --smush-placeholder-aspect-ratio: 620\/465;\" \/><\/a><br \/>\n<em>8 Ways To Make Your Password Super Duper Secure<\/em><\/p>\n<p>In order to create a strong password, you need to use a combination of lowercase letters, uppercase letters, numbers, and special characters. The majority of people create passwords that are made up of lowercase letters only. The more variation in character type, the stronger your password will be.<\/p>\n<h2>3. Don\u2019t Write It Down<\/h2>\n<p><a href=\"http:\/\/www.thegeekstuff.com\/2008\/06\/the-ultimate-guide-for-creating-strong-passwords\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-20325 lazyload\" title=\"The Ultimate Guide for Creating Strong Passwords\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/he-ultimate-guide-for-creating-strong-passwords-680x510.jpg\" alt=\"\" width=\"680\" height=\"510\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/he-ultimate-guide-for-creating-strong-passwords-680x510.jpg 680w, https:\/\/www.andysowards.com\/blog\/assets\/he-ultimate-guide-for-creating-strong-passwords-250x187.jpg 250w, https:\/\/www.andysowards.com\/blog\/assets\/he-ultimate-guide-for-creating-strong-passwords-125x93.jpg 125w, https:\/\/www.andysowards.com\/blog\/assets\/he-ultimate-guide-for-creating-strong-passwords-700x525.jpg 700w\" data-sizes=\"(max-width: 680px) 100vw, 680px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/510;\" \/><\/a><br \/>\n<em>The Ultimate Guide for Creating Strong Passwords<\/em><\/p>\n<p>You may think that writing down your password will be helpful in the event that you forget it, or you need a friend or family member to log in to your account for you. But writing down your password on a piece of paper or a post-it note is never a good idea. The second you lose track of it, all bets are off, and you could be hacked right away.<\/p>\n<h2>4. No Personal Information<\/h2>\n<p><a href=\"https:\/\/www.andysowards.com\/blog\/2013\/how-to-outsmart-social-engineering-hackers\/\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" title=\"How To Outsmart Social Engineering Hackers\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/cosmo-the-social-engineering-hacker-god-who-fell-to-earth.jpeg\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" style=\"--smush-placeholder-width: 660px; --smush-placeholder-aspect-ratio: 660\/374;\" \/><\/a><br \/>\n<em>How To Outsmart Social Engineering Hackers<\/em><\/p>\n<p>This is probably the most important aspect you need to keep in mind when creating a password. Do not use any personal information, such as your name, birthday, significant other, anniversary, kids\u2019 names, etc. All of this information is available via public records search, and hackers are well-aware of that. They can run a simple background check and, boom, they have a whole list of possible passwords they can use to try to hack your account.<\/p>\n<h2>5. Different Passwords For Different Accounts<\/h2>\n<p><a href=\"http:\/\/lifehacker.com\/5785420\/the-only-secure-password-is-the-one-you-cant-remember\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-20326 lazyload\" title=\"The Only Secure Password Is the One You Can\u2019t Remember\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/the-only-secure-password-is-the-one-you-cant-remember.jpg\" alt=\"\" width=\"640\" height=\"360\" data-srcset=\"https:\/\/www.andysowards.com\/blog\/assets\/the-only-secure-password-is-the-one-you-cant-remember.jpg 640w, https:\/\/www.andysowards.com\/blog\/assets\/the-only-secure-password-is-the-one-you-cant-remember-250x140.jpg 250w, https:\/\/www.andysowards.com\/blog\/assets\/the-only-secure-password-is-the-one-you-cant-remember-125x70.jpg 125w\" data-sizes=\"(max-width: 640px) 100vw, 640px\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/360;\" \/><\/a><br \/>\n<em>The Only Secure Password Is the One You Can\u2019t Remember<\/em><\/p>\n<p>Did you know that 70% of people use the exact same password for multiple accounts? Well, that\u2019s definitely not a good idea, because if a hacker obtains one of your passwords, then they have access to all of your private accounts. The effects of having one account hacked are bad enough, imagine if every single one of your accounts was compromised?<\/p>\n<h2>Moral Of The Story<\/h2>\n<p><iframe data-src=\"\/\/www.youtube.com\/embed\/Rn4Rupla11M\" width=\"640\" height=\"360\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" class=\"lazyload\" data-load-mode=\"1\"><\/iframe><br \/>\n<em>See How Easily Freaks Can Take Over Your Life<\/em><\/p>\n<p>Having your personal information hacked is one of the worst scenarios web users can encounter. When cybercriminals get a hold of your private information, the effects can be extremely damaging. They can gain access to your money, your private conversations, your personal address, and more. So, the moral of the story is this: If you want optimal security, you absolutely must focus on creating hacker-proof passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay your<\/p>\n","protected":false},"author":157,"featured_media":26830,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[12,109,5695,225,199,437,1,5633,107],"tags":[5891,988,425,1322,866,1325,4371,177,5835,5879,21,115,5890],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How To Create A Hacker-Proof Password<\/title>\n<meta name=\"description\" content=\"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How To Create A Hacker-Proof Password\" \/>\n<meta property=\"og:description\" content=\"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-16T21:24:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-12T00:16:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"740\" \/>\n\t<meta property=\"og:image:height\" content=\"601\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Maxine Delgato\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Maxine Delgato\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/\",\"name\":\"How To Create A Hacker-Proof Password\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png\",\"datePublished\":\"2013-07-16T21:24:42+00:00\",\"dateModified\":\"2023-03-12T00:16:53+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/c5f1014147b99148cbb5ce179d63bbcd\"},\"description\":\"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png\",\"width\":740,\"height\":601},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How To Create A Hacker-Proof Password\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/c5f1014147b99148cbb5ce179d63bbcd\",\"name\":\"Maxine Delgato\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/08e7ed311b71f2c5e1bad682944e61d4?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/08e7ed311b71f2c5e1bad682944e61d4?s=96&r=pg\",\"caption\":\"Maxine Delgato\"},\"description\":\"Maxine Delgado is a blogger from Fort Worth, TX. She specializes in writing about safety tips for the everyday tech user.\",\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/maxinedelgato\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How To Create A Hacker-Proof Password","description":"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/","og_locale":"en_US","og_type":"article","og_title":"How To Create A Hacker-Proof Password","og_description":"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay","og_url":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2013-07-16T21:24:42+00:00","article_modified_time":"2023-03-12T00:16:53+00:00","og_image":[{"width":740,"height":601,"url":"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png","type":"image\/png"}],"author":"Maxine Delgato","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Maxine Delgato","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/","url":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/","name":"How To Create A Hacker-Proof Password","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png","datePublished":"2013-07-16T21:24:42+00:00","dateModified":"2023-03-12T00:16:53+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/c5f1014147b99148cbb5ce179d63bbcd"},"description":"In this day and age, our entire lives are controlled by technology. When you go on the Internet, you can sign in to your Facebook profile, your email, pay","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/password_strength-1.png","width":740,"height":601},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2013\/strong-passwords\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How To Create A Hacker-Proof Password"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/c5f1014147b99148cbb5ce179d63bbcd","name":"Maxine Delgato","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/08e7ed311b71f2c5e1bad682944e61d4?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/08e7ed311b71f2c5e1bad682944e61d4?s=96&r=pg","caption":"Maxine Delgato"},"description":"Maxine Delgado is a blogger from Fort Worth, TX. She specializes in writing about safety tips for the everyday tech user.","url":"https:\/\/www.andysowards.com\/blog\/author\/maxinedelgato\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/20320"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/157"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=20320"}],"version-history":[{"count":2,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/20320\/revisions"}],"predecessor-version":[{"id":45309,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/20320\/revisions\/45309"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/26830"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=20320"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=20320"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=20320"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}