{"id":6781,"date":"2019-04-08T02:33:37","date_gmt":"2019-04-08T06:33:37","guid":{"rendered":"https:\/\/tsisupport.com\/?p=6781"},"modified":"2021-08-09T05:50:10","modified_gmt":"2021-08-09T09:50:10","slug":"dont-sue-your-employees-train-them","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=6781","title":{"rendered":"Cyber Security Defense: Give Your Employees Vishing and Phishing Training"},"content":{"rendered":"<p>As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day &#8211; one of my long-term clients called me up and wanted to discuss a story he&#8217;d read that was giving him concern.<\/p>\n<p><a href=\"https:\/\/blog.knowbe4.com\/company-sues-employee-after-she-falls-for-usd-250k-ceo-fraud-scam\" target=\"_blank\" rel=\"noopener noreferrer\">The first was the case of Patricia Rielly<\/a>, who was working for the UK Peebles Media Group. Not only did Mrs. Reilly ignore a number of very clear warnings about con artists tricking employees, but she fell into a trap she should have seen coming a mile away. She clicked on a check box on a webform that indicated she knew the risk she was about to take. She handed over about $250,000 of her employer&#8217;s money to an online attacker and now, she&#8217;s being sued for damages.<\/p>\n<p>Lawyers indicated that not only did Mrs. Reilly act negligently by falling for such a scam, but <a href=\"https:\/\/www.bbc.com\/news\/uk-scotland-glasgow-west-47135686\" target=\"_blank\" rel=\"noopener noreferrer\">she was never authorized to make payments on behalf of her company<\/a> in the first place. She was considered &#8220;the office gossip&#8221; and was privy to next to no sensitive information. And yet, $250,000 in damages later, she&#8217;s now involved in a bitter lawsuit that is making business owners all over the world nervous.<\/p>\n<p>Setting aside the fact that the owner of the company was more or less oblivious to her ability to access bank accounts to begin with (which is really something that should have been addressed earlier by all parties), it&#8217;s easy to see why this is such a big deal.<\/p>\n<p>My client wanted to know more about why this happened and what he needed to do to make sure it <em>didn&#8217;t happen to him<\/em>. Today, I&#8217;d like to tell you exactly what I told him:<\/p>\n<p>&#8220;It&#8217;s complicated.&#8221;<\/p>\n<p>In this article, I&#8217;ll be discussing the need for employee training, the sophisticated threat landscape we all collectively face, and what steps you can take to make sure you don&#8217;t have a Patricia Rielly working for your business.<\/p>\n<p><span style=\"color: #800000;\"><strong>How on Earth Does This Happen?<\/strong><\/span><\/p>\n<p>The major reason why situations like those outlined above occur can largely be boiled down to a single word: inaction.<\/p>\n<p>When a company doesn&#8217;t train its employees on all of the latest cyber threats and sophisticated types of attacks, how can you expect them to know how to avoid one? They&#8217;re not mind readers. They&#8217;re human beings like the rest of us, and human beings are known for making mistakes.<\/p>\n<p>If the owner of Patricia Rielly&#8217;s company had documented policies in place that were reviewed on a regular basis, and had invested in awareness training to bring people up to speed on all the latest threats, there is a very excellent chance that none of this would have happened.<\/p>\n<p>If you don&#8217;t properly vet your employees, how can you be certain that you&#8217;re not exposing yourself to one of the 75% of insider cyber attacks that involves malicious intent? That&#8217;s easy &#8211; you can&#8217;t be.<\/p>\n<p>If you don&#8217;t have any types of proactive systems like log monitors and auditors to track anomalous behaviors, how do you spot when someone is engaged in digital activity that is outside their role or the purview of their position?<\/p>\n<p>You don&#8217;t.<\/p>\n<p>Ultimately, cases like those referenced above are symptomatic of a poor management structure that allowed these types of catastrophes to happen in the first place. Yes, cyber security is complicated and digital criminals are getting savvier all the time. But in the end, it really isn&#8217;t much more complicated than that.<\/p>\n<p><span style=\"color: #800000;\"><strong>How Phishing is Evolving<\/strong><\/span><\/p>\n<p>One of the reasons why employee training is so critical has to do with how quickly these types of attacks are evolving. Even if you limited the discussion purely to phishing scams, you&#8217;re still dealing with a cyber monster that sprouts three new heads for every one that you manage to cut off:<\/p>\n<ul class=\"ULStyle\">\n<li>Spear phishing, which is an attack designed to gather and use personal information typically geared towards one or only a few individuals at your company.<\/li>\n<li>Whaling, which is a similar type of attack that is targeted directly at senior executives and other high profile people.<\/li>\n<li>Vishing, or voice phishing, which is when the attack uses a telephone call pretending to be from someone you know to gain access to sensitive data.<\/li>\n<li>Search engine phishing, which allows hackers to get illegitimate websites to rank highly on engines like Google so you essentially &#8220;come across it&#8221; on your own.<\/li>\n<li>Email spoofing. The best example of this is an email designed to look like one from your bank that really comes from a rogue actor. You log into your bank account thinking nothing is wrong, and suddenly a hacker has your username and password.<\/li>\n<li>Snowshoeing, or hit-and-run phishing, is small-batch spam that is less targeted than something like spear phishing designed to avoid triggering the threshold for cloud-based email spam filters.<\/li>\n<li>Business email compromise, or BEC, which is when hackers lean heavily on social engineering tactics to trick unsuspecting people into giving over critical data. The most famous example of this is <a href=\"https:\/\/krebsonsecurity.com\/tag\/bec-scams\/\" target=\"_blank\" rel=\"noopener noreferrer\">the &#8220;Nigerian Prince&#8221; email scam<\/a>.<\/li>\n<\/ul>\n<p><span style=\"color: #800000;\"><strong>So How Are You Supposed to Avoid This?<\/strong><\/span><\/p>\n<p>Thankfully, the answer to that question is a simple one &#8211; it begins and ends with employee training. Don&#8217;t just distribute a pamphlet letting employees know that attacks are on the rise. They&#8217;re probably not going to read it. Invest in education and really let them know what they should be aware of. <a href=\"https:\/\/www.knowbe4.com\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">Show them screen shot examples<\/a> of what to look for, and the sometimes subtle differences that separate a phishing email from something legitimate.<\/p>\n<p>Likewise, you need to do this A) whenever you bring on a new employee, and B) at least a few times a year as new threats emerge. Make no mistake: this CANNOT be something you &#8220;do once and forget about.&#8221; This is something you have to actively work on moving forward.<\/p>\n<p>During this time, you should also review all documented policies pertaining to device access and similar issues &#8211; if you&#8217;ve developed them, of course, which you should have. This, in conjunction with awareness training, are a core part of what needs to be done to educate employees and minimize these types of events as much as possible.<\/p>\n<p>But then again, even the owner of the company that Patricia Rielly worked for would probably tell you that extra effort is very much worth it.<\/p>\n<p><span style=\"color: #800000;\"><strong>What Have We Learned?<\/strong><\/span><\/p>\n<p>Assuming that you can ever avoid becoming the target of a cyber attack is not the goal, here. You will be, period &#8211; that&#8217;s not something you can control. What you&#8217;re trying to do is make sure you don&#8217;t wind up becoming the victim of an attack, and you do this by getting your employees trained.<\/p>\n<p>In addition to the legal reasons for this that the case above illustrates, there are practical reasons, too. You&#8217;re arming people with the knowledge they need to protect themselves instead of letting them assume your antivirus software will take care of it.<\/p>\n<p>Overall, make security and personnel evaluations routine and accountable to all. If in doubt, implement the right types of security tools to help close up any gaps you&#8217;ve identified before they&#8217;re exploited.<\/p>\n<p>If you&#8217;re still concerned about these types of cyber security-related issues and think that you can use a bit of additional assistance, great &#8211; we might be able to help.<\/p>\n<div class=\"fl-builder-content fl-builder-content-8723 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8723\"><div class=\"fl-row fl-row-full-width fl-row-bg-color fl-node-5ecf43b865ac4 fl-row-default-height fl-row-align-center BlogCTA\" data-node=\"5ecf43b865ac4\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecf43b866ba4 fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecf43b866ba4\">\n\t\t\t<div class=\"fl-col fl-node-5ecf43b86708f fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecf43b86708f\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5ecf4426e6c0a\" data-node=\"5ecf4426e6c0a\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">It\u2019s Your Move!<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5ecf443aaa1bf\" data-node=\"5ecf443aaa1bf\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<div class=\"uabb-infobox-text uabb-text-editor\">\n<p>I absolutely recommend that you give either myself or one of my colleagues at TSI a call so that we can help make sure all your bases are covered, and provide an opportunity to share how we step in and handle all of our existing clients\u2019 cyber security needs seamlessly and cost effectively.<\/p>\n<\/div>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecf446ed99d4 primary-btn\" data-node=\"5ecf446ed99d4\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecf440e64792 fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecf440e64792\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-photo fl-node-5ecf44bc4db07\" data-node=\"5ecf44bc4db07\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div role=\"figure\" class=\"fl-photo fl-photo-align-right\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t<div class=\"fl-photo-content fl-photo-img-png\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"fl-photo-img wp-image-8722 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/FTE-Article-CTA.png\" alt=\"FTE-Article-CTA\" height=\"360\" width=\"360\" title=\"FTE-Article-CTA\"  itemprop=\"image\" srcset=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/FTE-Article-CTA.png 360w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/FTE-Article-CTA-300x300.png 300w, https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/FTE-Article-CTA-150x150.png 150w\" sizes=\"(max-width: 360px) 100vw, 360px\" \/>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As someone who handles a lot of IT and cyber security-related fixtures for small businesses every day, I spent a lot of my time on the phone talking to clients about all of the latest attacks. It happened again just the other day &#8211; one of my long-term clients called me up and wanted to&hellip;<\/p>\n","protected":false},"author":7,"featured_media":8721,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[12],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cyber Security Defense | Employee Phishing Training | TSI<\/title>\n<meta name=\"description\" content=\"Don&#039;t sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn&#039;t fall into the wrong hands.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Defense | Employee Phishing Training | TSI\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn&#039;t fall into the wrong hands.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=6781\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-08T06:33:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-08-09T09:50:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeremy Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781\",\"name\":\"Cyber Security Defense | Employee Phishing Training | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg\",\"datePublished\":\"2019-04-08T06:33:37+00:00\",\"dateModified\":\"2021-08-09T09:50:10+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\"},\"description\":\"Don't sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn't fall into the wrong hands.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=6781\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=6781#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Defense: Give Your Employees Vishing and Phishing Training\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\",\"name\":\"Jeremy Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"caption\":\"Jeremy Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=7\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Defense | Employee Phishing Training | TSI","description":"Don't sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn't fall into the wrong hands.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Cyber Security Defense | Employee Phishing Training | TSI","og_description":"Don't sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn't fall into the wrong hands.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=6781","og_site_name":"TSI Support","article_published_time":"2019-04-08T06:33:37+00:00","article_modified_time":"2021-08-09T09:50:10+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg","type":"image\/jpeg"}],"author":"Jeremy Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeremy Louise","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781","url":"https:\/\/tsisupport.com\/tsistaging\/?p=6781","name":"Cyber Security Defense | Employee Phishing Training | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg","datePublished":"2019-04-08T06:33:37+00:00","dateModified":"2021-08-09T09:50:10+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926"},"description":"Don't sue your employees for damages \u2014\u00a0provide cyber security lessons and phishing training to ensure important data doesn't fall into the wrong hands.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=6781"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2019\/04\/Dont-Sue-Your-Employees-1140x380-1.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=6781#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Defense: Give Your Employees Vishing and Phishing Training"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926","name":"Jeremy Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","caption":"Jeremy Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=7"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/6781"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=6781"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/6781\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8721"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=6781"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=6781"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=6781"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}