{"id":200,"date":"2021-12-24T17:07:05","date_gmt":"2021-12-24T17:07:05","guid":{"rendered":"https:\/\/www.espinspire.com\/blog\/?p=200"},"modified":"2023-10-23T06:43:38","modified_gmt":"2023-10-23T06:43:38","slug":"protect-your-websites-from-cyber-attacks","status":"publish","type":"post","link":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/","title":{"rendered":"Protect Your Websites From Cyber Attacks- What You Need to Know?"},"content":{"rendered":"<p>A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately, cyber-attacks are becoming more prevalent. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point for other attacks. Cyber attacks are primarily criminally or politically motivated and can be executed by a private person, state actor or a criminal organization.<\/p><div id=\"ez-toc-container\" class=\"ez-toc-v2_0_74 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#What_are_Cyber_Attack_Motives\" >What are Cyber Attack Motives?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#What_Has_Happened\" >What Has Happened?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#How_Do_I_Prevent_Cyber_Attacks\" >How Do I Prevent Cyber Attacks?<\/a><\/li><\/ul><\/nav><\/div>\n\n<p>Criminals are on the lookout for the most vulnerable target. Protecting your data with cyber security is not only important for individuals but also for businesses and marketers.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_are_Cyber_Attack_Motives\"><\/span>What are Cyber Attack Motives?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Motives include stealing large sums of money and\/or destabilizing organizations or countries to make a social or political point through hacktivism, spying, secretly taking intellectual property and cryptocurrency mining. There are no boundaries these attacks can\u2019t cross because the criminals are traveling the worldwide internet<\/p>\n<p>As individuals and businesses, we are all potential targets of cyber attacks. Every individual and business has key assets that criminals may seek to exploit. Sometimes that is money or financial information. At other times, it may be the personal information of staff and customers, or even the business&#8217; infrastructure. And now, beyond assets, cyber criminals use blackmail with the threat of disabling your company or publishing your customer&#8217;s private information.<\/p>\n<p>Cyber security has been an ongoing issue and should be taken more seriously than ever before.<br \/>\nMobile marketing statistics from 2019 have shown us that 52.2% of all website traffic is generated through smartphones and mobile devices. It\u2019s expected that there will be close to 5 billion mobile users around the world by the end of this year. With that many people streaming the web on mobile devices, you can see why it\u2019s so important to protect the information you\u2019re importing to the internet.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"What_Has_Happened\"><\/span>What Has Happened?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li><strong>The personal data of over 500 million Facebook users was posted in a low-level hacking forum<\/strong>. The exposed data includes the personal information of over 533 million Facebook users from 106 countries, including over 32 million records on users in the US, 11 million on users in the UK, and 6 million on users in India. It includes their phone numbers, Facebook IDs, full names, locations, birthdates, bios, and, in some cases, email addresses.<\/li>\n<li><strong>Google warns MILLIONS of Gmail users about Russian hack attack.<\/strong> In November 2021, the US search giant said that the campaign aimed to steal people&#8217;s login credentials using phony emails sent to their inboxes.<\/li>\n<li><strong>86% of hacks in Google Cloud were used for illegal crypto mining.<\/strong> Weak or no password for a user account or no authentication for APIs caused 48% of the Google Cloud hacks. In the majority of cases, cryptocurrency mining software was downloaded within 22 seconds of the account being compromised, Google said.<\/li>\n<li><strong>Cyber-attack spearheaded by Russian hackers that targeted more than 12,000 users of Gmail. <\/strong>Attackers pinched people&#8217;s logins using a phishing email, an attack in which cybercriminals trick victims into handing over sensitive information.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"How_Do_I_Prevent_Cyber_Attacks\"><\/span>How Do I Prevent Cyber Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ol>\n<li><strong>Use Strong Passwords and Change Them Often<\/strong><br \/>\nAny criminal, including cybercriminals, will search for the simplest way to attack their target. Weak or missing password for a user account, or no two-factor authentication causes 48% of Google Cloud hacks. Users can avoid compromising their accounts if they just set up a stronger password. Strong passwords that are frequently changed have become a necessity.<\/li>\n<li><strong>Only Use Trusted Devices<\/strong><br \/>\nAuthentication ensures that each\u00a0device\u00a0or user can positively identify itself by\u00a0using\u00a0credentials that are\u00a0trusted\u00a0by the other\u00a0device.<\/li>\n<li><strong>Encrypt Your Files<\/strong><br \/>\nEncrypting your files ensures that only the specific people you send the file to are able to read and understand the message by using specific software. Even if you or your recipient gets hacked, your encrypted information will be safe.<\/li>\n<li><strong>Recognize Fraudulent Emails<\/strong><br \/>\nRoughly one in every 131 emails contains malware, and 67% of all malware globally is delivered by email. A single piece of malware, called ransomware, locks away all your data behind a paywall and it can cost thousands of dollars before the attackers will release your data.<br \/>\nYour first defense to protect against malicious emails is training so that employees know how to recognize fraudulent emails and know not to click on links found in these emails.<\/li>\n<li><strong>Protect Your Website<\/strong><br \/>\nThe average downtime from a ransomware attack is 33 business hours.<br \/>\nTo prevent a breach in your online security, you must ensure you offer protection for your customers, partners, and employees by invested time and money to secure your digital platforms such as your website, your social platforms, your payment portals, as well as securing internal systems such as your intranet, email, and records.<\/p>\n<ul>\n<li><strong>Keep all of your plug-ins up to date<\/strong> as well as your CMS (content management system), and update these as soon as a new version is released. As hackers find vulnerabilities, software developers rush to close the threat so keeping current with your plug-in updates is a good defense. Running out-of-date versions of themes, plugins and core site components is equivalent to leaving the front door of your house unlocked.<\/li>\n<li><strong>Implement two-factor authentication (2FA),<\/strong> which reduces the chance of hacking by strengthening security. Implement these tools on other entry points including email, your CRM system, and social media accounts.<\/li>\n<li><strong>Get a web application firewall (WAF),<\/strong> which puts your site behind a virtual wall of protection that inspects traffic going to it and blocks attacks. WAF also regularly scans your website for malware or downtime to prevent attacks.<\/li>\n<li><strong>Install an SSL digital certificate of protection<\/strong> (visible to website users), to protect customer information. It\u2019s important that your customers know that they are safe and can trust your website and their data when they are using your website. An added plus is that having the certificate helps boost your search engine rankings.<\/li>\n<\/ul>\n<\/li>\n<li><strong>Protect Your Social Media<\/strong><br \/>\nSocial Media accounts can be hacked with ease and create serious damage to your brand and reputation. Often people forget that cybersecurity is also important in managing your social media accounts. Protect your social media accounts in the same way you would your website or email systems. Make sure you have secure passwords, restricted access to only those who need it and require two-factor authentication.<\/li>\n<li><strong>Protect Your IT Systems<\/strong><br \/>\nYour internal IT systems are a huge target for attackers, and if they can get access to your local network, PCs, or servers, cyber-criminals can not only steal data but can also wreak havoc and severely impact business operations. Protect these vital assets with strong passwords that change frequently and install a\u00a0<a href=\"https:\/\/us.norton.com\/internetsecurity-privacy-what-is-a-vpn.html\" target=\"_blank\" rel=\"noopener noreferrer\">VPN<\/a> (a virtual private network) to further frustrate would-be hackers.<\/li>\n<\/ol>\n<p style=\"text-align: center;\"><strong><u>The Bottom Line: <\/u><\/strong><strong><u>Cyber Security is Crucial for Everyone<\/u><\/strong><\/p>\n<p style=\"text-align: center;\">Digital marketing is one of the fastest-growing industries today and<br \/>\ncybersecurity should be a top concern among digital marketers and the<br \/>\ncornerstone for any online business and well as individual users.<\/p>\n<p style=\"text-align: center;\">Trust is the basis of digital markets, and cyber security<br \/>\nis the foundation of your customers\u2019 trust.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately, cyber-attacks are becoming more prevalent. A cyber attack can maliciously disable computers, steal data, or use a breached computer as a launch point<\/p>\n","protected":false},"author":1,"featured_media":214,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[5,12],"tags":[],"class_list":["post-200","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-development","category-website-maintenance"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates<\/title>\n<meta name=\"description\" content=\"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates\" \/>\n<meta property=\"og:description\" content=\"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"ESP Inspire Blog News Updates\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-24T17:07:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-10-23T06:43:38+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"350\" \/>\n\t<meta property=\"og:image:height\" content=\"205\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/\",\"url\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/\",\"name\":\"Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates\",\"isPartOf\":{\"@id\":\"https:\/\/www.espinspire.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg\",\"datePublished\":\"2021-12-24T17:07:05+00:00\",\"dateModified\":\"2023-10-23T06:43:38+00:00\",\"author\":{\"@id\":\"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/0b532f844550573442bc0fc28fa10695\"},\"description\":\"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,\",\"breadcrumb\":{\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage\",\"url\":\"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg\",\"contentUrl\":\"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg\",\"width\":350,\"height\":205},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.espinspire.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect Your Websites From Cyber Attacks- What You Need to Know?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/#website\",\"url\":\"https:\/\/www.espinspire.com\/blog\/\",\"name\":\"ESP Inspire Blog News Updates\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.espinspire.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/0b532f844550573442bc0fc28fa10695\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1f7da31d5915205ca39daf838d5d24a68fe90232831cab7e724824d6dccf4e09?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1f7da31d5915205ca39daf838d5d24a68fe90232831cab7e724824d6dccf4e09?s=96&d=mm&r=g\",\"caption\":\"admin\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates","description":"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates","og_description":"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,","og_url":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/","og_site_name":"ESP Inspire Blog News Updates","article_published_time":"2021-12-24T17:07:05+00:00","article_modified_time":"2023-10-23T06:43:38+00:00","og_image":[{"width":350,"height":205,"url":"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/","url":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/","name":"Protect Your Websites From Cyber Attacks- What You Need to Know? - ESP Inspire Blog News Updates","isPartOf":{"@id":"https:\/\/www.espinspire.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg","datePublished":"2021-12-24T17:07:05+00:00","dateModified":"2023-10-23T06:43:38+00:00","author":{"@id":"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/0b532f844550573442bc0fc28fa10695"},"description":"A cyber attack is an assault launched by cybercriminals against your computers or against your network. Unfortunately,","breadcrumb":{"@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#primaryimage","url":"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg","contentUrl":"https:\/\/www.espinspire.com\/blog\/wp-content\/uploads\/2021\/12\/cyber-security-350-205.jpg","width":350,"height":205},{"@type":"BreadcrumbList","@id":"https:\/\/www.espinspire.com\/blog\/protect-your-websites-from-cyber-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.espinspire.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Protect Your Websites From Cyber Attacks- What You Need to Know?"}]},{"@type":"WebSite","@id":"https:\/\/www.espinspire.com\/blog\/#website","url":"https:\/\/www.espinspire.com\/blog\/","name":"ESP Inspire Blog News Updates","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.espinspire.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/0b532f844550573442bc0fc28fa10695","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.espinspire.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1f7da31d5915205ca39daf838d5d24a68fe90232831cab7e724824d6dccf4e09?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1f7da31d5915205ca39daf838d5d24a68fe90232831cab7e724824d6dccf4e09?s=96&d=mm&r=g","caption":"admin"}}]}},"_links":{"self":[{"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/posts\/200","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/comments?post=200"}],"version-history":[{"count":12,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/posts\/200\/revisions"}],"predecessor-version":[{"id":513,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/posts\/200\/revisions\/513"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/media\/214"}],"wp:attachment":[{"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/media?parent=200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/categories?post=200"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.espinspire.com\/blog\/wp-json\/wp\/v2\/tags?post=200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}