{"id":605,"date":"2021-10-26T12:21:20","date_gmt":"2021-10-26T12:21:20","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=605"},"modified":"2021-11-17T15:04:14","modified_gmt":"2021-11-17T15:04:14","slug":"cybersecurity-month-6-ways-to-avoid-phishing","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/","title":{"rendered":"Cybersecurity Month: 6 Ways to Avoid Phishing"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">It\u2019s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it&#8217;s getting access to passwords, credit cards, or other sensitive information, hackers are using email, social media, phone calls, and any form of communication they can to steal valuable data. Businesses, of course, are a particularly worthwhile target. Below are important tactics your organization can take to\u00a0 prevent phishing attacks.\u00a0<\/span><\/p>\n<p><b>1. Install Firewalls &amp; Anti-virus Software AND Update Them<\/b><\/p>\n<p><a href=\"https:\/\/us-cert.cisa.gov\/security-publications\/recognizing-and-avoiding-email-scams\"><span style=\"font-weight: 400;\">US-CERT recommends<\/span><\/a><span style=\"font-weight: 400;\"> installing antivirus software and personal firewalls on your personal devices and making sure they\u2019re set for automatic updates.\u00a0 Firewalls are an effective way to prevent external attacks, acting as a shield between your computer and an attacker. Both desktop firewalls and network firewalls, when used together, can bolster your security and reduce the chances of a hacker infiltrating your environment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s also essential to keep business and personal use separate \u2014 especially if you\u2019re working remotely: don\u2019t use your corporate device out of convenience to browse the internet, online shop, scroll through social media or check personal email.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Receiving numerous update messages can be frustrating, and it can be tempting to put them off or ignore them altogether. Don\u2019t do this. Security patches and updates are released for a reason, most commonly to keep up to date with modern cyber-attack methods by patching holes in security. If you don\u2019t update your browser, you could be at risk of phishing attacks through known vulnerabilities that could have been easily avoided.<\/span><br \/>\n<b><\/b><\/p>\n<p><b>2. Configure accounts to reduce the impact of successful attacks<\/b><b><\/b><\/p>\n<p><span style=\"font-weight: 400;\">You should configure your staff accounts in advance using the principle of &#8216;least privilege&#8217;. This means giving staff the lowest level of user rights required to perform their jobs, so if they are the victim of a phishing attack, the potential damage is reduced. To further reduce the damage that can be done by malware or loss of login details, ensure that your staff don\u2019t browse the web or check emails from an account with Administrator privileges. An Administrator account is a user account that allows you to make changes that will affect other users. Administrators can change security settings, install software and hardware, and access all files on the computer. So an attacker having unauthorised access to an Administrator account can be far more damaging than accessing a standard user account.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Use two-factor authentication (2FA) on your important accounts such as email. This means that even if an attacker knows your passwords, they still won\u2019t be able to access that account.<\/span><\/p>\n<p><b>3. Think Before You Click<\/b><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s fine to click on links when you\u2019re on trusted sites. Clicking on links that appear in random emails and instant messages, however, isn\u2019t such a smart move. Hover over links that you are unsure of before clicking on them. Do they lead where they are supposed to lead? A phishing email may claim to be from a legitimate company and when you click the link to the website, it may look exactly like the real website. The email may ask you to fill in the information but the email may not contain your name. Most phishing emails will start with \u201cDear Customer\u201d so you should be alert when you come across these emails. When in doubt, go directly to the source rather than clicking a potentially dangerous link.<\/span><\/p>\n<p><b>4. Install an Anti-Phishing Toolbar<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Most browsers can be customized with anti-phishing toolbars. Such toolbars run quick checks on the sites that you are visiting and compare them to lists of known phishing sites. If you stumble upon a malicious site, the toolbar will alert you about it. This is just one more layer of protection against phishing scams, and it is completely free.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some of these programs are completely free, while others require paying a minimal fee, before downloading what is a fairly lightweight client. This software is then ready to help you detect phishing sites, running unnoticed in the background at all times.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Anti-phishing toolbars are useful, as they check everything that you may click on in real-time, blocking anything that could possibly be malicious. This is useful for those who aren\u2019t particularly technologically savvy. But there is a downside to this technology as well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The fact that toolbars are generally free to download, is not exactly an indication of quality and research has also indicated that this approach to phishing has a relatively low success rate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Certainly, toolbars shouldn\u2019t be viewed as comprehensive anti-phishing coverage. Even if they can be a nifty and useful tool in some circumstances.<\/span><\/p>\n<p><b>5. Cloud-Based Anti-Phishing<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Another aspect of cloud-phishing tools that is worth considering are cloud-based solutions. These are focused on a wide range of potential avenues for phishing attacks, but often particularly help protect email from attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-based solutions can be updated on a very regular basis, due to the way that the cloud operates, while cloud-based solutions are also convenient, as they can be built into a cloud package at the retail level.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cloud-based anti-phishing tools aren\u2019t necessarily more sophisticated than other forms of anti\u2013phishing software. But they are more flexible and adaptable, while being able to incorporate the information generated by the experiences of many users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Tapping into the power of the cloud helps anti-phishing work in an almost automated fashion, complementing other techniques and strategies.<\/span><\/p>\n<p><b>6. Monitoring Remote Sessions<\/b><\/p>\n<p><span style=\"font-weight: 400;\">With more employees working from home, companies are seeking ways of monitoring remote sessions. One compelling case can be made for recording remote sessions for later playback and review. Employers are concerned that in the event of a security breach, they won\u2019t be able to see what was happening on users\u2019 desktops when the breach occurred. Another reason for recording remote sessions is to maintain compliance, as required for medical and financial institutions or auditing for business protocols, etc.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">TSFactory&#8217;s RecordTS v6 will record Windows sessions reliably and securely for RDS, Citrix, VMware, Azure and AWS hosted and on-premise environments. Scalable from small offices with one server to enterprise networks with tens of thousands of desktops and servers, RecordTS integrates seamlessly with the native environment.<\/span><\/p>\n<p><a href=\"https:\/\/www.tsfactory.com\/\"><span style=\"font-weight: 400;\">Click here<\/span><\/a><span style=\"font-weight: 400;\"> to learn more about secure remote session recording.<\/span><\/p>\n<p><b>References<\/b><\/p>\n<p><a href=\"https:\/\/digitalguardian.com\/blog\/phishing-attack-prevention-how-identify-avoid-phishing-scams\"><span style=\"font-weight: 400;\">https:\/\/digitalguardian.com\/blog\/phishing-attack-prevention-how-identify-avoid-phishing-scams<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.lepide.com\/blog\/10-ways-to-prevent-phishing-attacks\/\"><span style=\"font-weight: 400;\">https:\/\/www.lepide.com\/blog\/10-ways-to-prevent-phishing-attacks\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.wired.com\/2017\/03\/phishing-scams-fool-even-tech-nerds-heres-avoid\/\"><span style=\"font-weight: 400;\">https:\/\/www.wired.com\/2017\/03\/phishing-scams-fool-even-tech-nerds-heres-avoid\/<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.cyberark.com\/resources\/blog\/8-ways-to-fight-the-phish-this-cybersecurity-awareness-month\"><span style=\"font-weight: 400;\">https:\/\/www.cyberark.com\/resources\/blog\/8-ways-to-fight-the-phish-this-cybersecurity-awareness-month<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide\/avoiding-phishing-attacks\"><span style=\"font-weight: 400;\">https:\/\/www.ncsc.gov.uk\/collection\/small-business-guide\/avoiding-phishing-attacks<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.phishing.org\/10-ways-to-avoid-phishing-scams\"><span style=\"font-weight: 400;\">https:\/\/www.phishing.org\/10-ways-to-avoid-phishing-scams<\/span><\/a><\/p>\n<p><a href=\"https:\/\/pixm.net\/blog\/phishing-attacks\/anti-phishing-tools\/\"><span style=\"font-weight: 400;\">https:\/\/pixm.net\/blog\/phishing-attacks\/anti-phishing-tools\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it&#8217;s getting access to passwords, credit cards, or other sensitive information, hackers are using email, [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":622,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-605","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs\" \/>\n<meta property=\"og:description\" content=\"It\u2019s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it&#8217;s getting access to passwords, credit cards, or other sensitive information, hackers are using email, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-26T12:21:20+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-11-17T15:04:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"880\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/\",\"name\":\"Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg\",\"datePublished\":\"2021-10-26T12:21:20+00:00\",\"dateModified\":\"2021-11-17T15:04:14+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg\",\"width\":880,\"height\":2000},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Month: 6 Ways to Avoid Phishing\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs","og_description":"It\u2019s nearly the end of Cybersecurity Awareness Month 2021 and TSFactory is highlighting how to prevent phishing attacks. Phishing attacks are one of the most common security challenges that both individuals and companies face in keeping their information secure. Whether it&#8217;s getting access to passwords, credit cards, or other sensitive information, hackers are using email, [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2021-10-26T12:21:20+00:00","article_modified_time":"2021-11-17T15:04:14+00:00","og_image":[{"width":880,"height":2000,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/","name":"Cybersecurity Month: 6 Ways to Avoid Phishing - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg","datePublished":"2021-10-26T12:21:20+00:00","dateModified":"2021-11-17T15:04:14+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2021\/10\/FD1tsMJXIA0Qf93.jpg","width":880,"height":2000},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-month-6-ways-to-avoid-phishing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Month: 6 Ways to Avoid Phishing"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/605","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=605"}],"version-history":[{"count":3,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/605\/revisions"}],"predecessor-version":[{"id":610,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/605\/revisions\/610"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/622"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=605"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=605"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=605"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}