{"id":23887,"date":"2016-06-07T15:32:01","date_gmt":"2016-06-07T19:32:01","guid":{"rendered":"http:\/\/www.andysowards.com\/blog\/?p=23887"},"modified":"2023-03-11T19:37:56","modified_gmt":"2023-03-11T23:37:56","slug":"high-profile-security-breaches-and-how-to-stay-protected","status":"publish","type":"post","link":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/","title":{"rendered":"2 High Profile Security Breaches and How to Stay Protected"},"content":{"rendered":"<p>With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber warfare that plagues our society today.<\/p>\n<p>Whether it\u2019s a group of intelligent, computer-savvy people hacking away for entertainment, or those with an agenda behind their actions, a keyboard can be one of the most powerful weapons one can have.<\/p>\n<p>Read on for a recap of two of the most high-profile security breaches of our time and, more importantly, how you can keep your business safe from security breaches.<\/p>\n<h2>Sony Pictures Entertainment<\/h2>\n<p><a href=\"http:\/\/www.slate.com\/articles\/technology\/users\/2015\/11\/sony_employees_on_the_hack_one_year_later.html\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-23888 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif\" alt=\"sony-hack-high-profile-security-breaches-and-how-to-prevent\" width=\"1024\" height=\"512\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 1024px; --smush-placeholder-aspect-ratio: 1024\/512;\" \/><\/a><br \/>\n<em>Inside the Sony Hack<\/em><\/p>\n<p>The hack on Sony Pictures Entertainment in 2014 by a group self-identified as the \u201cGuardians of Peace\u201d leaked personal information of Sony Pictures staff members, as well as private emails (including those with not-so-nice exchanges about actors and actresses like Angelina Jolie), salaries and even unreleased films from Sony.<\/p>\n<p><a href=\"http:\/\/www.vanityfair.com\/hollywood\/2015\/02\/sony-hacking-seth-rogen-evan-goldberg\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-23889 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/sony-under-siege-hack-north-korea-interview-vf-680x465.jpg\" alt=\"sony-under-siege-hack-north-korea-interview-vf\" width=\"680\" height=\"465\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/465;\" \/><\/a><br \/>\n<em>An Exclusive Look at Sony\u2019s Hacking Saga<\/em><\/p>\n<p>The hacking group insisted Sony stop it\u2019s film \u201cThe Interview,\u201d a comedy about a plot to assassinate Kim Jong-un, leader of North Korea. After evaluation by U.S. intelligence, it was determined that the hack was initiated by North Korea, though the country does not admit to any involvement.<\/p>\n<h2>Ashley Madison<\/h2>\n<p><a href=\"http:\/\/www.theverge.com\/2015\/8\/19\/9178965\/ashley-madison-hacked-news-data-names-list\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-large wp-image-23894 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/ashley-madison-hacked-news-data-names-list-680x454.jpg\" alt=\"ashley-madison-hacked-news-data-names-list\" width=\"680\" height=\"454\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 680px; --smush-placeholder-aspect-ratio: 680\/454;\" \/><\/a><br \/>\n<em>The Ashley Madison hack: everything you need to know<\/em><\/p>\n<p>Perhaps one of the highest profile and risqu\u00e9 cyberattacks was the 2015 of hookup website <a href=\"https:\/\/en.wikipedia.org\/wiki\/Ashley_Madison\" target=\"_blank\" rel=\"noopener\">Ashley Madison<\/a>. The online dating service and social networking site \u2014 whose slogan is \u201cLife is short. Have an affair.\u201d \u2014 is aimed at married people and those in relationships. It promises discretion to its members who are interested in adultery.<\/p>\n<p>Last year, a group named &#8220;Impact Team&#8221; hacked the website\u2019s database of users in hopes to blackmail Ashley Madison\u2019s parent company to remove the website altogether. A month later, when the site was still active, the hackers released all of the website\u2019s data, including the names and addresses of nearly 40 million people who used the site. Many well-known politicians and public figures were members identified during the hack. The company still faces several lawsuits in light of the hack.<\/p>\n<h2>Stay Protected Online<\/h2>\n<p><a href=\"http:\/\/gizmodo.com\/5932663\/9-things-you-absolutely-must-do-to-keep-your-online-identity-secure\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-23891 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/keep-online-identity-safe-on-the-web.png\" alt=\"keep-online-identity-safe-on-the-web\" width=\"640\" height=\"360\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 640px; --smush-placeholder-aspect-ratio: 640\/360;\" \/><\/a><br \/>\n<em>9 Things You Absolutely Must Do to Keep Your Online Identity Secure<\/em><\/p>\n<p>In today\u2019s increasingly tech-forward world, it is a sheer necessity to do all you can to keep your business, your customers\u2019 and your employees\u2019 information safe from breaches and cyberattacks.<\/p>\n<p>According to experts, the first step to safety is to educate your staff. With attacks becoming more and more advanced, employees need to be aware of dangerous emails and links that look legit. One faulty click and malware can take over your system and compromise sensitive information.<\/p>\n<p>Keep your employees aware of the various types of methods hackers are using through regular training and urging them to report any and all suspicious emails and links. Also require that employees change their passwords every three months at the most, as many hacks happen in light of weak passwords.<\/p>\n<p>Additionally, if your company does not have in-house hosting for your site and you use a third-party hosting service, it is key to ensure you are protected. Using only services that are well-known for their security measures like encryption is crucial. Do your research and be sure you can trust your hosting service provider.<\/p>\n<p>Further, if your company sells products or services online, experts say it is wise to also use a hosted shopping cart service whose only job is keeping your customers\u2019 information secure.<\/p>\n<h2>Keep Your Physical Space Safe<\/h2>\n<p><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2420677,00.asp\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"alignnone size-full wp-image-23892 lazyload\" data-src=\"https:\/\/www.andysowards.com\/blog\/assets\/5-Tips-for-Business-Security.jpg\" alt=\"5 Tips for Business Security\" width=\"625\" height=\"352\" src=\"data:image\/svg+xml;base64,PHN2ZyB3aWR0aD0iMSIgaGVpZ2h0PSIxIiB4bWxucz0iaHR0cDovL3d3dy53My5vcmcvMjAwMC9zdmciPjwvc3ZnPg==\" style=\"--smush-placeholder-width: 625px; --smush-placeholder-aspect-ratio: 625\/352;\" \/><\/a><br \/>\n<em>5 Tips for Business Security<\/em><\/p>\n<p>Though online safety measures are at the forefront of today\u2019s safety recommendations, it is key to remember how to keep your actual brick and mortar business safe, as well. If necessary, employ security guards to man the doors of your company. Further, investing in a high-quality security camera system to help protect your employees (and data) is essential.<\/p>\n<p>High-definition security cameras with video surveillance offer the height of safety, and allow you the peace of mind of knowing your company is under the protection of a watchful eye.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber warfare<\/p>\n","protected":false},"author":1,"featured_media":23888,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_bbp_topic_count":0,"_bbp_reply_count":0,"_bbp_total_topic_count":0,"_bbp_total_reply_count":0,"_bbp_voice_count":0,"_bbp_anonymous_reply_count":0,"_bbp_topic_count_hidden":0,"_bbp_reply_count_hidden":0,"_bbp_forum_subforum_count":0,"footnotes":""},"categories":[109,4206,5695,199,359,1,5633,107],"tags":[1752,4368,352,425,866,1994,5088,177,5901,5879,2869,115,5890],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>2 High Profile Security Breaches and How to Stay Protected<\/title>\n<meta name=\"description\" content=\"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"2 High Profile Security Breaches and How to Stay Protected\" \/>\n<meta property=\"og:description\" content=\"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/\" \/>\n<meta property=\"og:site_name\" content=\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/facebook.com\/andysowardsfan\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-07T19:32:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-11T23:37:56+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"512\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/gif\" \/>\n<meta name=\"author\" content=\"Andy Sowards\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@andysowards\" \/>\n<meta name=\"twitter:site\" content=\"@andysowards\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Andy Sowards\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/\",\"url\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/\",\"name\":\"2 High Profile Security Breaches and How to Stay Protected\",\"isPartOf\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif\",\"datePublished\":\"2016-06-07T19:32:01+00:00\",\"dateModified\":\"2023-03-11T23:37:56+00:00\",\"author\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\"},\"description\":\"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber\",\"breadcrumb\":{\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage\",\"url\":\"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif\",\"contentUrl\":\"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif\",\"width\":1024,\"height\":512},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.andysowards.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"2 High Profile Security Breaches and How to Stay Protected\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#website\",\"url\":\"https:\/\/www.andysowards.com\/blog\/\",\"name\":\"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards\",\"description\":\"Design Inspiration &amp; Business Resources for Creatives\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415\",\"name\":\"Andy Sowards\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg\",\"caption\":\"Andy Sowards\"},\"description\":\"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards\",\"sameAs\":[\"https:\/\/www.andysowards.com\"],\"url\":\"https:\/\/www.andysowards.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"2 High Profile Security Breaches and How to Stay Protected","description":"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/","og_locale":"en_US","og_type":"article","og_title":"2 High Profile Security Breaches and How to Stay Protected","og_description":"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber","og_url":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/","og_site_name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","article_publisher":"http:\/\/facebook.com\/andysowardsfan","article_published_time":"2016-06-07T19:32:01+00:00","article_modified_time":"2023-03-11T23:37:56+00:00","og_image":[{"width":1024,"height":512,"url":"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif","type":"image\/gif"}],"author":"Andy Sowards","twitter_card":"summary_large_image","twitter_creator":"@andysowards","twitter_site":"@andysowards","twitter_misc":{"Written by":"Andy Sowards","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/","url":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/","name":"2 High Profile Security Breaches and How to Stay Protected","isPartOf":{"@id":"https:\/\/www.andysowards.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage"},"image":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage"},"thumbnailUrl":"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif","datePublished":"2016-06-07T19:32:01+00:00","dateModified":"2023-03-11T23:37:56+00:00","author":{"@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415"},"description":"With cyberattacks on the rise \u2014 many of which are aimed at high-profile individuals and companies \u2014 it\u2019s safe to say that no one is safe from the cyber","breadcrumb":{"@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#primaryimage","url":"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif","contentUrl":"https:\/\/www.andysowards.com\/blog\/assets\/sony-hack-high-profile-security-breaches-and-how-to-prevent.gif","width":1024,"height":512},{"@type":"BreadcrumbList","@id":"https:\/\/www.andysowards.com\/blog\/2016\/high-profile-security-breaches-and-how-to-stay-protected\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.andysowards.com\/blog\/"},{"@type":"ListItem","position":2,"name":"2 High Profile Security Breaches and How to Stay Protected"}]},{"@type":"WebSite","@id":"https:\/\/www.andysowards.com\/blog\/#website","url":"https:\/\/www.andysowards.com\/blog\/","name":"Daily Business Resources for Entrepreneurs, Web Designers, &amp; Creatives by Andy Sowards","description":"Design Inspiration &amp; Business Resources for Creatives","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.andysowards.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/2e0f72bd7f6497fd883e2bd67d9f3415","name":"Andy Sowards","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.andysowards.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/15f95b011563b5894883b22bd4b32d59?s=96&r=pg","caption":"Andy Sowards"},"description":"Im a professional Freelancer specializing in Web Developer, Design, Programming web applications. Im an Avid member of the Design\/Development community and a Serial Blogger. follow me on Twitter @AndySowards","sameAs":["https:\/\/www.andysowards.com"],"url":"https:\/\/www.andysowards.com\/blog\/author\/admin\/"}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23887"}],"collection":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/comments?post=23887"}],"version-history":[{"count":1,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23887\/revisions"}],"predecessor-version":[{"id":45294,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/posts\/23887\/revisions\/45294"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media\/23888"}],"wp:attachment":[{"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/media?parent=23887"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/categories?post=23887"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.andysowards.com\/blog\/wp-json\/wp\/v2\/tags?post=23887"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}