{"id":2341,"date":"2015-11-03T14:19:23","date_gmt":"2015-11-03T14:19:23","guid":{"rendered":"http:\/\/www.instantoffices.com\/blog\/?p=2341"},"modified":"2017-02-17T07:47:11","modified_gmt":"2017-02-17T07:47:11","slug":"tips-experts-basics-protecting-company-cybercrime","status":"publish","type":"post","link":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/","title":{"rendered":"Tips From the Experts: The Basics of Protecting your Business from Cybercrime"},"content":{"rendered":"<p>It\u2019s a fact that our dependency upon technology and internet in the workplace comes with an elevated risk of cybercrime. We may think we are safe in the digital world and that no one will ever hack our databases, but even small to medium businesses are being hacked on a daily basis.<\/p>\n<p>Ben Simpson took some time off from managing his team of IT engineers at\u00a0<a href=\"http:\/\/www.microbyte.co.uk\/\" target=\"_blank\">Microbyte Solutions<\/a> to share some of the most basic steps you can take to lower your company\u2019s online risk profile.<\/p>\n<h2><strong><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-9827 size-full\" src=\"http:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson.jpg\" alt=\"IT expert - ben-simpson\" width=\"960\" height=\"960\" srcset=\"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson.jpg 960w, https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson-150x150.jpg 150w, https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson-300x300.jpg 300w, https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson-768x768.jpg 768w, https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson-109x109.jpg 109w, https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/ben-simpson-100x100.jpg 100w\" sizes=\"(max-width: 960px) 100vw, 960px\" \/><\/strong><\/h2>\n<h2><strong>Use Complex Passwords<\/strong><\/h2>\n<p>We use passwords and security questions to access the majority of protected content online these days, but so many users continue to use simple passwords, and to use the same password across multiple platforms.<\/p>\n<p>You will usually find that a website or program has a password strength analyser, which will tell you how strong your password is. Use a minimum of 8 characters and a mixture of upper and lower case letters. Include symbols and numbers where possible, to ensure that your password is complex enough to make guessing it tough. Don\u2019t use key dates such as birthdays or names, and instead, stick with random phrases or number combinations.<\/p>\n<p>Update your passwords periodically and don\u2019t use the same password across more than one platform. If you have data that you only want certain team members to have access to, ensure that passwords are different to those used on software for all to use.<\/p>\n<h2>Security Packages<\/h2>\n<p>The main security packages you will need are a firewall and antivirus software. A firewall acts as your computer\u2019s first line of defence against potential attacks and determines who is allowed to interact with your computer. Antivirus software protects you from malicious programs and potential viruses that may have found their way onto your computer. These software packages are essential in staying safe online and protecting important data and information.<\/p>\n<h2>Be Wary of Phishing Attempts<\/h2>\n<p>Phishing is a technique that cyber criminals use to secure your information by posing as an entity that you recognise, such as your bank, your ISP or your email service provider. Phishing attempts have become increasingly complex and sophisticated, using mirror sites (a fake copy of a site you\u2019re accustomed to using) and branded emails. Never provide private information or login details in an email. No legitimate operation will ever ask you to do that. If an email links you to a website that seems legitimate, contact the service provider to confirm the legitimacy of the email before entering any personal details.<\/p>\n<h2>Update Software<\/h2>\n<p>Set up your computer, laptop, tablet and smartphones to automatically update when the latest software package becomes available. This way, you\u2019ll never miss an update and your devices will be protected by the latest security features.<\/p>\n<p>If you are unable to set packages to automatically update, consider setting a weekly or monthly reminder in your calendar to manually check for any new antivirus updates.<\/p>\n<h2>Open Documents in Word Safe Mode<\/h2>\n<p>When opening a Word document directly from an email, use Word safe mode to disable any malicious files that may be contained within the document\u2019s code. Word safe mode will allow you to intercept any actions that the document is trying to perform when opening it, and view them in the \u201cDisabled Items\u201d dialog box. To open a document in safe mode, hold down Ctrl and then double click the document you want to open.<\/p>\n<h2>Personal Information<\/h2>\n<p>Being conscious of what data you share across the internet is critical to lower your online risk profile. Be absolutely sure that you are only sharing with trustworthy sites and sources. If a link looks questionable, don\u2019t click it and always enter the URL into your website browser if you are unsure. Emails should never ask you to verify personal data or protected information, so avoid emails that ask you to do so, or ask you to act immediately.<\/p>\n<h2>Adapt Your Computer<\/h2>\n<p>New devices often come with standard packages and settings, pre-installed. Taking time to configure your security settings, particularly those of your internet browser and email software, will help to protect you from cyber-attacks.<\/p>\n<h2>Use Disk Encryption<\/h2>\n<p>Encrypting your disk and the files on it is a great way to avoid data theft, in the case of a security breach. Encryption scrambles the data on your files so that it is unreadable to outside sources.<\/p>\n<p>These are the most basic steps that you can take to reduce your company\u2019s online risk profile and can easily be completed in a single morning. Don\u2019t become another victim of cybercrime. Protect yourself now.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s a fact that our dependency upon technology and internet in the workplace comes with an elevated risk of cybercrime. We may think we are safe in the digital world and that no one will ever hack our databases, but even small to medium businesses are being hacked on a daily basis. Ben Simpson took some time off from managing his team of IT engineers at\u00a0Microbyte Solutions to share some of the most basic steps you can take to lower your company\u2019s online risk profile. Use Complex Passwords We use passwords and security questions to access the majority of protected content online these days, but so many users continue to use simple passwords, and to use the same password across multiple platforms. You will usually find that a website or program has a password strength analyser, which will tell you how strong your password is. Use a minimum of 8 characters and a mixture of upper and lower case letters. Include symbols and numbers where possible, to ensure that your password is complex enough to make guessing it tough. Don\u2019t use key dates such as birthdays or names, and instead, stick with random phrases or number combinations. Update your passwords periodically and don\u2019t use the same password across more than one platform. If you have data that you only want certain team members to have access to, ensure that passwords are different to those used on software for all to use. Security Packages The main security packages you will need are a firewall and antivirus software. A firewall acts as your computer\u2019s first line of defence against potential attacks and determines who is allowed to interact with your computer. Antivirus software protects you from malicious programs and potential viruses that may have found their way onto your computer. These software packages are essential in staying safe online and protecting important data and information. Be Wary of Phishing Attempts Phishing is a technique that cyber criminals use to secure your information by posing as an entity that you recognise, such as your bank, your ISP or your email service provider. Phishing attempts have become increasingly complex and sophisticated, using mirror sites (a fake copy of a site you\u2019re accustomed to using) and branded emails. Never provide private information or login details in an email. No legitimate operation will ever ask you to do that. If an email links you to a website that seems legitimate, contact the service provider to confirm the legitimacy of the email before entering any personal details. Update Software Set up your computer, laptop, tablet and smartphones to automatically update when the latest software package becomes available. This way, you\u2019ll never miss an update and your devices will be protected by the latest security features. If you are unable to set packages to automatically update, consider setting a weekly or monthly reminder in your calendar to manually check for any new antivirus updates. Open Documents in Word Safe Mode When opening a Word document directly from an email, use Word safe mode to disable any malicious files that may be contained within the document\u2019s code. Word safe mode will allow you to intercept any actions that the document is trying to perform when opening it, and view them in the \u201cDisabled Items\u201d dialog box. To open a document in safe mode, hold down Ctrl and then double click the document you want to open. Personal Information Being conscious of what data you share across the internet is critical to lower your online risk profile. Be absolutely sure that you are only sharing with trustworthy sites and sources. If a link looks questionable, don\u2019t click it and always enter the URL into your website browser if you are unsure. Emails should never ask you to verify personal data or protected information, so avoid emails that ask you to do so, or ask you to act immediately. Adapt Your Computer New devices often come with standard packages and settings, pre-installed. Taking time to configure your security settings, particularly those of your internet browser and email software, will help to protect you from cyber-attacks. Use Disk Encryption Encrypting your disk and the files on it is a great way to avoid data theft, in the case of a security breach. Encryption scrambles the data on your files so that it is unreadable to outside sources. These are the most basic steps that you can take to reduce your company\u2019s online risk profile and can easily be completed in a single morning. Don\u2019t become another victim of cybercrime. Protect yourself now.<\/p>\n","protected":false},"author":1,"featured_media":9160,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,217],"tags":[150,149,148],"class_list":["post-2341","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business-growth","category-expert-tips","tag-business-security","tag-cybercrime","tag-online-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog<\/title>\n<meta name=\"description\" content=\"Discover the most basic steps to lower your company&#039;s cybercrime risk profile. Protect your sensitive data and personal information.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog\" \/>\n<meta property=\"og:description\" content=\"Discover the most basic steps to lower your company&#039;s cybercrime risk profile. Protect your sensitive data and personal information.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/\" \/>\n<meta property=\"og:site_name\" content=\"Instant Offices Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/InstantOffices\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/InstantOffices\" \/>\n<meta property=\"article:published_time\" content=\"2015-11-03T14:19:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-02-17T07:47:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"430\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Instant\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/Instant_Offices\" \/>\n<meta name=\"twitter:site\" content=\"@instant_offices\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Instant\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/\",\"url\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/\",\"name\":\"Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.instantoffices.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg\",\"datePublished\":\"2015-11-03T14:19:23+00:00\",\"dateModified\":\"2017-02-17T07:47:11+00:00\",\"author\":{\"@id\":\"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/938027a69297f349d730148f6ff48788\"},\"description\":\"Discover the most basic steps to lower your company's cybercrime risk profile. Protect your sensitive data and personal information.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage\",\"url\":\"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg\",\"contentUrl\":\"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg\",\"width\":960,\"height\":430,\"caption\":\"tips-from-the-experts-the-basics-of-protecting-your-business-from-cybercrime\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.instantoffices.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Tips From the Experts: The Basics of Protecting your Business from Cybercrime\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/#website\",\"url\":\"https:\/\/www.instantoffices.com\/blog\/\",\"name\":\"Instant Offices Blog\",\"description\":\"Your Business Growth Resource\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.instantoffices.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/938027a69297f349d730148f6ff48788\",\"name\":\"Instant\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8fb1b21c82eac8cc65b2220d8f679971?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8fb1b21c82eac8cc65b2220d8f679971?s=96&d=mm&r=g\",\"caption\":\"Instant\"},\"description\":\"Instant provides Managed Offices, Serviced Offices, Benchmarking &amp; Insight, Portfolio Management. We cover 99% of the office market. Contact us today!\",\"sameAs\":[\"http:\/\/www.instantoffices.com\/blog\/\",\"https:\/\/www.facebook.com\/InstantOffices\",\"http:\/\/www.linkedin.com\/company\/Instant\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/Instant_Offices\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog","description":"Discover the most basic steps to lower your company's cybercrime risk profile. Protect your sensitive data and personal information.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/","og_locale":"en_GB","og_type":"article","og_title":"Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog","og_description":"Discover the most basic steps to lower your company's cybercrime risk profile. Protect your sensitive data and personal information.","og_url":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/","og_site_name":"Instant Offices Blog","article_publisher":"https:\/\/www.facebook.com\/InstantOffices","article_author":"https:\/\/www.facebook.com\/InstantOffices","article_published_time":"2015-11-03T14:19:23+00:00","article_modified_time":"2017-02-17T07:47:11+00:00","og_image":[{"width":960,"height":430,"url":"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg","type":"image\/jpeg"}],"author":"Instant","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/Instant_Offices","twitter_site":"@instant_offices","twitter_misc":{"Written by":"Instant","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/","url":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/","name":"Protecting your Business from Cybercrime | Expert Tips - Instant Offices Blog","isPartOf":{"@id":"https:\/\/www.instantoffices.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage"},"image":{"@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage"},"thumbnailUrl":"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg","datePublished":"2015-11-03T14:19:23+00:00","dateModified":"2017-02-17T07:47:11+00:00","author":{"@id":"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/938027a69297f349d730148f6ff48788"},"description":"Discover the most basic steps to lower your company's cybercrime risk profile. Protect your sensitive data and personal information.","breadcrumb":{"@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#primaryimage","url":"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg","contentUrl":"https:\/\/www.instantoffices.com\/blog\/wp-content\/uploads\/2015\/11\/Tips-From-the-Experts-The-Basics-of-Protecting-your-Business-from-Cybercrime.jpg","width":960,"height":430,"caption":"tips-from-the-experts-the-basics-of-protecting-your-business-from-cybercrime"},{"@type":"BreadcrumbList","@id":"https:\/\/www.instantoffices.com\/blog\/business-growth\/tips-experts-basics-protecting-company-cybercrime\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.instantoffices.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Tips From the Experts: The Basics of Protecting your Business from Cybercrime"}]},{"@type":"WebSite","@id":"https:\/\/www.instantoffices.com\/blog\/#website","url":"https:\/\/www.instantoffices.com\/blog\/","name":"Instant Offices Blog","description":"Your Business Growth Resource","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.instantoffices.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/938027a69297f349d730148f6ff48788","name":"Instant","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.instantoffices.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8fb1b21c82eac8cc65b2220d8f679971?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8fb1b21c82eac8cc65b2220d8f679971?s=96&d=mm&r=g","caption":"Instant"},"description":"Instant provides Managed Offices, Serviced Offices, Benchmarking &amp; Insight, Portfolio Management. We cover 99% of the office market. Contact us today!","sameAs":["http:\/\/www.instantoffices.com\/blog\/","https:\/\/www.facebook.com\/InstantOffices","http:\/\/www.linkedin.com\/company\/Instant\/","https:\/\/x.com\/https:\/\/twitter.com\/Instant_Offices"]}]}},"_links":{"self":[{"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/posts\/2341"}],"collection":[{"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/comments?post=2341"}],"version-history":[{"count":14,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/posts\/2341\/revisions"}],"predecessor-version":[{"id":10830,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/posts\/2341\/revisions\/10830"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/media\/9160"}],"wp:attachment":[{"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/media?parent=2341"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/categories?post=2341"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.instantoffices.com\/blog\/wp-json\/wp\/v2\/tags?post=2341"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}