{"id":1330,"date":"2020-10-12T18:55:00","date_gmt":"2020-10-12T18:55:00","guid":{"rendered":"https:\/\/www.pax8.com\/future-blog\/cybersecurity-best-practices\/"},"modified":"2023-05-17T01:30:46","modified_gmt":"2023-05-17T01:30:46","slug":"cybersecurity-best-practices","status":"publish","type":"post","link":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/","title":{"rendered":"8 internal cybersecurity best practices"},"content":{"rendered":"<p>As an\u00a0IT professional, you\u00a0understand\u00a0the importance of\u00a0a\u00a0well-rounded security\u00a0posture.<\/p>\n<p>Make sure you follow these <a href=\"https:\/\/www.pax8.com\/vendors\/category\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">cybersecurity<\/a> best practices internally or risk an attack that compromises\u00a0your system and\u00a0ultimately\u00a0your\u00a0clients.<\/p>\n<h2>The top cybersecurity best practices all tech service providers should implement<\/h2>\n<h3>1. Use a password manager.<\/h3>\n<p>Every day, hundreds of stolen credentials are put on the dark web.\u00a0Leverage a password manager\u00a0to generate and organize unique\u00a0password\u00a0for\u00a0every application your team\u00a0uses.<\/p>\n<h3>2. Require MFA everywhere possible.<\/h3>\n<p>Multi-Factor Authentication (MFA) is key to combating unauthorized access to sensitive data.\u00a0You should\u00a0use\u00a0MFA\u00a0within your RMM and PSA tools,\u00a0and it should be required for admins of\u00a0Microsoft,\u00a0backup, and security\u00a0tools.<\/p>\n<h3>3. Manage updates and patches.<\/h3>\n<p>Keeping Windows\u00a0updated\u00a0is crucial, but you need to look beyond the operating system. Make sure your applications and tools, especially your RMM and PSA tools,\u00a0have the latest patches.<\/p>\n<h3>4. Lock down endpoints.<\/h3>\n<p>Implement an\u00a0endpoint\u00a0protection solution\u00a0that leverages next-gen detection engines and provides automated remediation capabilities.\u00a0You\u2019ll likely want to disable the use of USB drives and the execution of script files, as well as prevent users from running specific applications and block inappropriate\/malicious websites.<\/p>\n<h3>5. Harden email services.<\/h3>\n<p>Layer additional security with more advanced functionalities, such as URL scanning and attachment sandboxing, onto\u00a0Microsoft\u00a0Exchange Online. Configurations should also be\u00a0set up\u00a0to filter malicious file types and extensions, or non-business-related IP addresses.\u00a0Configuring SPF, DKIM, and DMARC records can\u00a0combat\u00a0spoofing techniques used against your organization.<\/p>\n<h3>6. Create an incident response plan.<\/h3>\n<p>Formally define an action plan for security incidents.\u00a0Examine\u00a0current assets, evaluate\u00a0your potential risk, and establish\u00a0clear guidelines to analyze, contain, and remediate\u00a0threats.\u00a0\u00a0A\u00a0post-breach inquiry should be conducted to confirm the attack\u00a0isn\u2019t repeatable.\u00a0Consider forming an Incident Response Team\u00a0and\u00a0formalizing a\u00a0communications plan\u00a0to\u00a0inform\u00a0clients\u00a0and business partners\u00a0when an incident occurs.<\/p>\n<h3>7. Require security awareness training.<\/h3>\n<p>Initial security training should be required for all new hires, as well as\u00a0recurring, company-wide\u00a0security education. It\u2019s critical that\u00a0your employees know\u00a0how to identify attacks\u00a0and\u00a0understand what to do after a potential threat is discovered.<\/p>\n<h3>8. Apply and test backups.<\/h3>\n<p>No\u00a0solution promises 100% protection, which makes having backup across all workloads so crucial. Backing up cloud data is just as important as on-prem data.\u00a0Don\u2019t overlook recovery responsibilities\u00a0when crafting a redundancy strategy. Testing your backup is critical to make sure all data is recoverable.<\/p>\n<h2>Tech solutions to support and automate cybersecurity<\/h2>\n<p>These\u00a0internal cybersecurity\u00a0best practices will protect your company\u2019s data and give your team experience with these\u00a0solutions, which can help increase sales and improve support.\u00a0Talk to your\u00a0Pax8 Cloud Wingman\u00a0to learn more about\u00a0the\u00a0security solutions you should implement internally.<\/p>\n<p><a class=\"btn-primary\" href=\"https:\/\/www.pax8.com\/blog\/contact-pax8\">Schedule a call<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As an\u00a0IT professional, you\u00a0understand\u00a0the importance of\u00a0a\u00a0well-rounded security\u00a0posture. Make sure you follow these cybersecurity best practices internally or risk an attack that compromises\u00a0your system and\u00a0ultimately\u00a0your\u00a0clients. The top cybersecurity best practices all tech service providers should implement 1. Use a password manager. Every day, hundreds of stolen credentials are put on the dark web.\u00a0Leverage a password manager\u00a0to [&hellip;]<\/p>\n","protected":false},"author":141,"featured_media":22,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_relevanssi_hide_post":"","_relevanssi_hide_content":"","_relevanssi_pin_for_all":"","_relevanssi_pin_keywords":"","_relevanssi_unpin_keywords":"","_relevanssi_related_keywords":"","_relevanssi_related_include_ids":"","_relevanssi_related_exclude_ids":"","_relevanssi_related_no_append":"","_relevanssi_related_not_related":"","_relevanssi_related_posts":"","_relevanssi_noindex_reason":"","site-sidebar-layout":"default","site-content-layout":"default","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","ast-disable-related-posts":"","theme-transparent-header-meta":"default","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[8,4,5,9],"tags":[],"class_list":["post-1330","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-advisors","category-msp","category-security","category-telco-agents"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>8 internal cybersecurity best practices - Pax8 Blog<\/title>\n<meta name=\"description\" content=\"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"8 internal cybersecurity best practices - Pax8 Blog\" \/>\n<meta property=\"og:description\" content=\"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Pax8 Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-12T18:55:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-17T01:30:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"1276\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"narnold\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"narnold\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/\"},\"author\":{\"name\":\"narnold\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\"},\"headline\":\"8 internal cybersecurity best practices\",\"datePublished\":\"2020-10-12T18:55:00+00:00\",\"dateModified\":\"2023-05-17T01:30:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/\"},\"wordCount\":466,\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/8-Internal-Cybersecurity-Best-Practices-Pax8.png\",\"articleSection\":[\"Business advisors\",\"MSPs\",\"Security\",\"Telco agents\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/\",\"name\":\"8 internal cybersecurity best practices - Pax8 Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/8-Internal-Cybersecurity-Best-Practices-Pax8.png\",\"datePublished\":\"2020-10-12T18:55:00+00:00\",\"dateModified\":\"2023-05-17T01:30:46+00:00\",\"description\":\"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/8-Internal-Cybersecurity-Best-Practices-Pax8.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/8-Internal-Cybersecurity-Best-Practices-Pax8.png\",\"width\":2000,\"height\":1276,\"caption\":\"Hands typing on laptop with cybersecurity best practices icons on image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/cybersecurity-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"8 internal cybersecurity best practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"name\":\"Pax8 Blog\",\"description\":\"Where IT pros go to keep up with the cloud\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#organization\",\"name\":\"Pax8 Blog\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"contentUrl\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/13\\\/2023\\\/03\\\/pax8-logo-white-blog-300x300-1.png\",\"width\":300,\"height\":300,\"caption\":\"Pax8 Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/#\\\/schema\\\/person\\\/4f1f5ecebcf730cc2be7b763a310a63c\",\"name\":\"narnold\",\"url\":\"https:\\\/\\\/www.pax8.com\\\/blog\\\/author\\\/narnold\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"8 internal cybersecurity best practices - Pax8 Blog","description":"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"8 internal cybersecurity best practices - Pax8 Blog","og_description":"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.","og_url":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/","og_site_name":"Pax8 Blog","article_published_time":"2020-10-12T18:55:00+00:00","article_modified_time":"2023-05-17T01:30:46+00:00","og_image":[{"width":2000,"height":1276,"url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png","type":"image\/png"}],"author":"narnold","twitter_card":"summary_large_image","twitter_misc":{"Written by":"narnold","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#article","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/"},"author":{"name":"narnold","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c"},"headline":"8 internal cybersecurity best practices","datePublished":"2020-10-12T18:55:00+00:00","dateModified":"2023-05-17T01:30:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/"},"wordCount":466,"publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png","articleSection":["Business advisors","MSPs","Security","Telco agents"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/","url":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/","name":"8 internal cybersecurity best practices - Pax8 Blog","isPartOf":{"@id":"https:\/\/www.pax8.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png","datePublished":"2020-10-12T18:55:00+00:00","dateModified":"2023-05-17T01:30:46+00:00","description":"Make sure you follow these cybersecurity best practices internally or risk an attack that\u00a0compromises\u00a0your system and your\u00a0clients.","breadcrumb":{"@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#primaryimage","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/8-Internal-Cybersecurity-Best-Practices-Pax8.png","width":2000,"height":1276,"caption":"Hands typing on laptop with cybersecurity best practices icons on image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.pax8.com\/blog\/cybersecurity-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pax8.com\/blog\/"},{"@type":"ListItem","position":2,"name":"8 internal cybersecurity best practices"}]},{"@type":"WebSite","@id":"https:\/\/www.pax8.com\/blog\/#website","url":"https:\/\/www.pax8.com\/blog\/","name":"Pax8 Blog","description":"Where IT pros go to keep up with the cloud","publisher":{"@id":"https:\/\/www.pax8.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pax8.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pax8.com\/blog\/#organization","name":"Pax8 Blog","url":"https:\/\/www.pax8.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","contentUrl":"https:\/\/www.pax8.com\/blog\/wp-content\/uploads\/sites\/13\/2023\/03\/pax8-logo-white-blog-300x300-1.png","width":300,"height":300,"caption":"Pax8 Blog"},"image":{"@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.pax8.com\/blog\/#\/schema\/person\/4f1f5ecebcf730cc2be7b763a310a63c","name":"narnold","url":"https:\/\/www.pax8.com\/blog\/author\/narnold\/"}]}},"_links":{"self":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1330","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/users\/141"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/comments?post=1330"}],"version-history":[{"count":0,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/posts\/1330\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media\/22"}],"wp:attachment":[{"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/media?parent=1330"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/categories?post=1330"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pax8.com\/blog\/wp-json\/wp\/v2\/tags?post=1330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}