{"id":668,"date":"2022-03-15T13:28:04","date_gmt":"2022-03-15T13:28:04","guid":{"rendered":"https:\/\/www.tsfactory.com\/forums\/blogs\/?p=668"},"modified":"2022-02-15T16:00:11","modified_gmt":"2022-02-15T16:00:11","slug":"cybersecurity-insurance-all-your-questions-asked","status":"publish","type":"post","link":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/","title":{"rendered":"Cybersecurity Insurance: All Your Questions Asked"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Cybersecurity insurance, once a measure only certain sectors took, is now becoming ubiquitous. The increase in ransansomeware, especially since the Covid-19 pandemic, has been a catalyst which now means that insurance is no longer just an option but is a necessary cybersecurity protocol. As a result, providers are putting up their premium prices and turning away prospects without sufficient cybersecurity precautions. For companies unable to secure cyber insurance, it may not just be risky but an impediment to their business, as it is becoming a condition of doing business in some areas. In certain industries and certain revenue segments it&#8217;s not uncommon to see a requirement for cyber insurance before engaging in a contract.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0Below, we answer some common questions for those who are new to this type of insurance.\u00a0<\/span><\/p>\n<p><b>What is Cybersecurity Insurance?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Cyber insurance (also referred to as cyber risk or cyber liability insurance) is a form of cover designed to protect your business from threats in the digital age, such as data breaches or malicious cyber hacks on work computer systems.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A business is responsible for its own cybersecurity, but in the event of a cyber attack having the right insurance will mean you aren\u2019t alone. Cyber liability cover will provide crucial support to help your business stay afloat.<\/span><\/p>\n<p><b>What Does Cyber Insurance Cover?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">A robust cyber insurance policy covers three main categories of financial risk:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">First-Party Expenses: This category includes costs that organizations would ordinarily have to pay to mitigate losses related to a data breach or privacy incident. Examples of first-party expenses are incident response and digital forensics services, PR services to manage reputational damage caused by a breach, notification to affected parties, and other expenses involved with directly responding to a cyber incident.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Third-Party Expenses: This category covers costs associated with defending liability claims and\/or fines and penalties assessed by regulating authorities. Examples include legal fees to defend lawsuits against the company and fines for violating HIPAA regulations.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber Crime Costs: This category deals with financial losses resulting directly from criminal activity. An example is the theft of funds as a result of digital fraud.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When assessing the strength of a cyber policy, it\u2019s a good idea to look for coverage pertaining to the following common issues:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Cyber Extortion: Ransomware attacks are a prevalent form of cyber extortion.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Social Engineering: Phishing and spear phishing campaigns are types of social engineering.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Business Interruption: Losing revenue from downtime caused by a cyber incident constitutes business interruption.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Virus Transmission: End-to-end coverage applies from discovery to removal of a virus, even if the virus spreads before being removed.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Liability Implications: Legal fees and regulatory fines comprise typical liability costs.<\/span><\/li>\n<\/ul>\n<p><b>Who Needs Cyber Insurance?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Businesses that create, store and manage electronic data online, such as customer contacts, customer sales, PII and credit card numbers, can benefit from cyber insurance. In addition, e-commerce businesses can benefit from cyber insurance, since downtime related to cyber incidents can cause a loss in sales and customers. Similarly, any business that stores customer information on a website can benefit from the liability coverage that cyber insurance policies provide.<\/span><\/p>\n<p><b>Current Pressure on the Insurance Industry<\/b><\/p>\n<p><span style=\"font-weight: 400;\">But the ongoing ransomware crisis has put the sector under extreme pressure, as a growing number of victims are being squeezed for eye-watering sums. \u201cYou\u2019ve got two very interesting dynamics happening, both at the same time,\u201d <\/span><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/cyber-insurance\"><span style=\"font-weight: 400;\">explains Lori Bailey<\/span><\/a><span style=\"font-weight: 400;\">, chief insurance officer at Corvus Insurance. \u201cOne is a huge increase in claim frequency, which is a result of the ransomware epidemic over the last couple of years.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The second dynamic is the growing value of claims. The average ransom demanded by cybercriminals in the first half of 2021 was $5.3m, <\/span><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/cyber-insurance#:~:text=The%20average%20ransom%20demanded%20by,%25%2C%20reaching%20a%20record%20%24570%2C000.\"><span style=\"font-weight: 400;\">up 518% from the 2020 figure, according to Palo Alto Networks\u2019 Unit42 research division<\/span><\/a><span style=\"font-weight: 400;\">. The average payment grew by 82%, reaching a record $570,000.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These two dynamics are squeezing the insurance industry\u2019s ability to pay out on its customers\u2019 claims. &#8220;Carriers, and more specifically re-insurers, really struggle with this dynamic in the market,\u201d says Bailey.<\/span><\/p>\n<p><b>What Policies You Need to have in Place Before Obtaining Insurance\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">\u201cHaving cyber insurance doesn\u2019t take the place of a strong cybersecurity infrastructure. Increasingly sophisticated attacks continue with larger payouts that make obtaining cyber insurance more difficult and more expensive. This comes from a recent report by Fortified Health Security\u2019s \u201c2022 Horizon Report\u201d in which they urged healthcare organizations to remember that cyber insurance is not a band-aid for inadequate cybersecurity measures.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cyber insurers are increasingly requiring organizations to implement security technologies, such as endpoint detection and response (EDR) solutions, into their security architecture to mitigate risk. Some insurers will not cover expenses associated with a security incident if the organization did not implement basic cybersecurity measures.<\/span><\/p>\n<p><b>Don\u2019t Ignore Security Monitoring<\/b><\/p>\n<p><span style=\"font-weight: 400;\">User Activity Monitoring allows you to monitor users to verify that their actions meet good security practices. If a malicious outsider gains access to their log-in information, or if an insider chooses to take advantage of their system access, you will have a record of the suspicious activity.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If your organization is like most others, you don\u2019t have the budget to stand up your own security operations center. But that doesn\u2019t remove the need for around-the-clock monitoring and intelligence that will help you investigate incidents and minimize attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the spirit of preserving your data, session recording software offers a way to protect your organization. Visit www.tsfactory.com to learn more about how we can help you prevent data insider threats and theft.<\/span><\/p>\n<p><b>Sources<\/b><\/p>\n<p><a href=\"https:\/\/techmonitor.ai\/technology\/cybersecurity\/cyber-insurance\"><span style=\"font-weight: 400;\">https:\/\/techmonitor.ai\/technology\/cybersecurity\/cyber-insurance<\/span><\/a><\/p>\n<p><a href=\"https:\/\/healthitsecurity.com\/news\/cyber-insurance-does-not-replace-need-for-cybersecurity-program\"><span style=\"font-weight: 400;\">https:\/\/healthitsecurity.com\/news\/cyber-insurance-does-not-replace-need-for-cybersecurity-program<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.hiscox.co.uk\/business-insurance\/cyber-and-data-insurance\/faq\/what-is-cyber-insurance\"><span style=\"font-weight: 400;\">https:\/\/www.hiscox.co.uk\/business-insurance\/cyber-and-data-insurance\/faq\/what-is-cyber-insurance<\/span><\/a><\/p>\n<p><a href=\"https:\/\/hbr.org\/2021\/01\/cybersecurity-insurance-has-a-big-problem\"><span style=\"font-weight: 400;\">https:\/\/hbr.org\/2021\/01\/cybersecurity-insurance-has-a-big-problem<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybersecurity-insurance-cybersecurity-liability-insurance\"><span style=\"font-weight: 400;\">https:\/\/www.techtarget.com\/searchsecurity\/definition\/cybersecurity-insurance-cybersecurity-liability-insurance<\/span><\/a><\/p>\n<p><a href=\"https:\/\/zeguro.com\/blog\/cyber-insurance-checklist-what-you-should-keep-in-mind-when-buying-cyber-insurance\"><span style=\"font-weight: 400;\">https:\/\/zeguro.com\/blog\/cyber-insurance-checklist-what-you-should-keep-in-mind-when-buying-cyber-insurance<\/span><\/a><\/p>\n<p><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/school-district-reports-a-334-percent-hike-in-cybersecurity-insurance-costs\/\"><span style=\"font-weight: 400;\">https:\/\/www.bleepingcomputer.com\/news\/security\/school-district-reports-a-334-percent-hike-in-cybersecurity-insurance-costs\/<\/span><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity insurance, once a measure only certain sectors took, is now becoming ubiquitous. The increase in ransansomeware, especially since the Covid-19 pandemic, has been a catalyst which now means that insurance is no longer just an option but is a necessary cybersecurity protocol. As a result, providers are putting up their premium prices and turning [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":670,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4],"tags":[],"class_list":["post-668","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-infosec-digest"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity Insurance: All Your Questions Asked - Blogs<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Insurance: All Your Questions Asked - Blogs\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity insurance, once a measure only certain sectors took, is now becoming ubiquitous. The increase in ransansomeware, especially since the Covid-19 pandemic, has been a catalyst which now means that insurance is no longer just an option but is a necessary cybersecurity protocol. As a result, providers are putting up their premium prices and turning [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\" \/>\n<meta property=\"og:site_name\" content=\"Blogs\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TSFactoryLLC\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-15T13:28:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Chelsie Wyatt\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:site\" content=\"@TSFactoryLLC\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Chelsie Wyatt\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\",\"name\":\"Cybersecurity Insurance: All Your Questions Asked - Blogs\",\"isPartOf\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg\",\"datePublished\":\"2022-03-15T13:28:04+00:00\",\"author\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg\",\"contentUrl\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg\",\"width\":960,\"height\":640,\"caption\":\"The concept of business, technology, the Internet and the network. A young entrepreneur working on a virtual screen of the future and sees the inscription: Cyber insurance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Insurance: All Your Questions Asked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#website\",\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/\",\"name\":\"Blogs\",\"description\":\"TSFactory\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f\",\"name\":\"Chelsie Wyatt\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g\",\"caption\":\"Chelsie Wyatt\"},\"url\":\"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Insurance: All Your Questions Asked - Blogs","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity Insurance: All Your Questions Asked - Blogs","og_description":"Cybersecurity insurance, once a measure only certain sectors took, is now becoming ubiquitous. The increase in ransansomeware, especially since the Covid-19 pandemic, has been a catalyst which now means that insurance is no longer just an option but is a necessary cybersecurity protocol. As a result, providers are putting up their premium prices and turning [&hellip;]","og_url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/","og_site_name":"Blogs","article_publisher":"https:\/\/www.facebook.com\/TSFactoryLLC\/","article_published_time":"2022-03-15T13:28:04+00:00","og_image":[{"width":960,"height":640,"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg","type":"image\/jpeg"}],"author":"Chelsie Wyatt","twitter_card":"summary_large_image","twitter_creator":"@TSFactoryLLC","twitter_site":"@TSFactoryLLC","twitter_misc":{"Written by":"Chelsie Wyatt","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/","name":"Cybersecurity Insurance: All Your Questions Asked - Blogs","isPartOf":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage"},"image":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg","datePublished":"2022-03-15T13:28:04+00:00","author":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f"},"breadcrumb":{"@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#primaryimage","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg","contentUrl":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-content\/uploads\/sites\/16\/2022\/03\/cyberinsurance1.jpg","width":960,"height":640,"caption":"The concept of business, technology, the Internet and the network. A young entrepreneur working on a virtual screen of the future and sees the inscription: Cyber insurance"},{"@type":"BreadcrumbList","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/cybersecurity-insurance-all-your-questions-asked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.tsfactory.com\/forums\/blogs\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Insurance: All Your Questions Asked"}]},{"@type":"WebSite","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#website","url":"https:\/\/www.tsfactory.com\/forums\/blogs\/","name":"Blogs","description":"TSFactory","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.tsfactory.com\/forums\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/9d9908f0e12559297335ebe9b601c82f","name":"Chelsie Wyatt","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.tsfactory.com\/forums\/blogs\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/09ff3801fb7566acf715fe4e81a9bd942b923c236138a3ed8a8375f099e5d6d6?s=96&d=mm&r=g","caption":"Chelsie Wyatt"},"url":"https:\/\/www.tsfactory.com\/forums\/blogs\/author\/chelsie\/"}]}},"_links":{"self":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/668","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/comments?post=668"}],"version-history":[{"count":1,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/668\/revisions"}],"predecessor-version":[{"id":669,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/posts\/668\/revisions\/669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media\/670"}],"wp:attachment":[{"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/media?parent=668"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/categories?post=668"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.tsfactory.com\/forums\/blogs\/wp-json\/wp\/v2\/tags?post=668"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}