{"id":7969,"date":"2020-03-30T11:46:47","date_gmt":"2020-03-30T15:46:47","guid":{"rendered":"https:\/\/tsisupport.com\/?p=7969"},"modified":"2021-07-07T05:06:04","modified_gmt":"2021-07-07T09:06:04","slug":"security-the-most-important-factor-impacting-the-iot-in-2020-and-beyond","status":"publish","type":"post","link":"https:\/\/tsisupport.com\/tsistaging\/?p=7969","title":{"rendered":"Protecting Against IoT Vulnerabilities: IoT Security Solutions in 2020"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As someone who has been in the technology business for over 25 years, it&#8217;s safe to say that I&#8217;ve seen a lot of so-called tech trends come and go. But one that I find truly exciting is also one that is very much here to stay: IoT, also known as, the Internet of Things.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In no uncertain terms, the implications of IoT are enormous. We&#8217;re already seeing them play out in our personal lives, as even your average consumer likely has many different IoT devices all over their homes such as smart fridges, wireless thermostats, garage door openers, and door locks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But it isn&#8217;t just consumers that are benefiting from these exciting trends. Businesses- notably hospitals- are embracing IoT with open arms, too. If you walk into your average hospital, more than 50% of the devices that you see in front of you will be connected to the Internet of Things in some way. These devices are constantly creating and sharing data with one another, in order to provide a better degree of proactive healthcare to the patients who need it the most.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But whether you&#8217;re talking about a personal or business application of IoT technology, they\u2019re still heavily reliant upon your wireless networks to work properly. If your wireless network goes down at work, suddenly that IoT-powered TV you have on the wall of your conference room for video meetings won&#8217;t operate as you need it to. Most importantly, it\u2019s clear that healthcare providers can&#8217;t let a spotty wireless internet connection get in the way of a patient\u2019s critical, life-saving medical device.<\/span><\/p>\n<h5><b>Security and the Internet of Things: The State of the Situation in 2020<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">But even more so than general reliability, IoT depends on SECURE wireless connections to make things possible. Remember that literally any device connected both to your network and to the internet are a potential vulnerability just waiting to be exploited by someone with malicious intentions. Now, think about all of those IoT devices you have and the potential risk you&#8217;re exposing yourself to without some way to properly secure and manage them moving forward.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the things that really makes these goals difficult is that a lot of the devices we&#8217;re talking about are seldom updated to address security issues and related matters. Think about things from the perspective of your average personal &#8220;smart home&#8221; user. How often is that electronic lock that you installed on your front door really updated? The next time you go into the app that controls your smart lighting equipment, check to see when the last firmware update was issued &#8211; was it even in the same calendar year we&#8217;re currently in?<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Now, realize that the IoT in the world of business is still operating in largely the same way. A lot of the devices that are powering offices, factory floors and similar professional environments are updated just as rarely &#8211; if they&#8217;re updated at all. This, of course, is a problem. It doesn&#8217;t mean that security vulnerabilities don&#8217;t exist. It just means they&#8217;re not being addressed in any type of appreciable way.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many don&#8217;t realize that these devices will need to be updated on a regular basis- just like laptops or smartphones- to give you access to the latest patches, bug fixes and &#8211; most critically &#8211; security updates. The scary reality is that you\u2019re only as strong as your most recent update; Think about what a hacker could do if they were able to access those same live video feeds remotely without your knowledge. In addition to this, the fact that these devices oftentimes are missing central management consoles requires that devices are updated on an individual basis rather than en-masse. The devices themselves may have connected to one another in the ways in which they were designed to, but from the management side of things, you were still largely looking at assets that have to be maintained individually.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Indeed, security is maybe the most important topic to discuss when talking about the Internet of Things in 2020 and beyond. Not only do all of these devices need to be constantly accessible, but they also need to be locked down so that they can&#8217;t be accessed or breached in a way that would cause catastrophic disasters across the board.<\/span><\/p>\n<h5><b>The Dangers of Poor Network Security in the IoT Age<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">While on the topic of security, it&#8217;s equally important to understand that staying safe with regards to the Internet of Things is about more than just securing the devices themselves. As covered above, this is very important &#8211; but it&#8217;s also just one small part of a much larger story.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It&#8217;s equally important to protect the network that these devices are using to connect with one another. Think about all of the critical data that something like a medical device is creating on a regular basis. Now, realize that even if the medical device itself is locked down if your network ISN&#8217;T you&#8217;re potentially exposing all of that information to anyone who knows what they&#8217;re doing.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Therefore, one of the most important steps that businesses can take to protect both themselves and their customers in the IoT age involves enforcing more stringent password sophistication rules than ever before. Not only should passwords be complicated, they should also be changed on a regular basis &#8211; the stakes are far too high to ignore this.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If employees are having a hard time creating sophisticated passwords (and worry that they won&#8217;t be able to remember them), a business should absolutely invest in a password management tool to help make this far easier. Not only will this remove the dependence on the end-user to create strong passwords, but in a lot of industries (like those governed by HIPAA) it&#8217;s actually a regulatory requirement.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Along the same lines, businesses should absolutely embrace techniques like log monitoring and auditing &#8211; both of which are far more sophisticated than anything a standard firewall offers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The types of tools that fall under this category not only provide real-time notifications and alerting when something goes wrong, they&#8217;re actually paying close attention to ALL network activity 24 hours a day, seven days a week, 365 days per year. Not only that but logs also often include crucial information like destination and source addresses, timestamps of suspicious activity, user information and more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">I&#8217;ve said it before and I&#8217;ll say it again &#8211; in the era we&#8217;re currently living in, you cannot stop yourself from becoming the target of hackers with malicious intention. There is no business &#8220;too small&#8221; to attract the wrong type of attention and, if anything, it&#8217;s no longer a matter of &#8220;if,&#8221; but &#8220;when.&#8221;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having said that, strong password practices coupled with log monitoring and auditing can prevent you from becoming a victim by allowing you to stop a small problem now before it becomes a much bigger one later, which is ultimately the most important benefit of all. This will only become more important as the Internet of Things age continues, and as more and more devices begin to populate every corner of our personal and professional lives.<\/span><\/p>\n<h5><b>The Future of Technology Has Officially Arrived<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">So, if nothing else, understand that even more so than securing your wireless network, you need to take steps to secure those IoT devices themselves. The risks are far too great to take a reactive, &#8220;lax&#8221; approach to this topic, especially for patients depending upon that technology. Even over the next five years, the IoT industry is going to unlock a huge amount of potential for businesses in just about every industry you can name \u2013 alongside a higher degree of risk as well. But provided that you understand the unique requirements that securing IoT devices demand, you&#8217;ll be able to enjoy all the benefits with as few of those potential downsides as possible.<\/span><\/p>\n<div class=\"fl-builder-content fl-builder-content-8843 fl-builder-template fl-builder-row-template fl-builder-global-templates-locked\" data-post-id=\"8843\"><div class=\"fl-row fl-row-full-width fl-row-bg-color fl-node-5ecf5fe261fb1 fl-row-default-height fl-row-align-center BlogCTA\" data-node=\"5ecf5fe261fb1\">\n\t<div class=\"fl-row-content-wrap\">\n\t\t\t\t\t\t\t\t<div class=\"fl-row-content fl-row-fixed-width fl-node-content\">\n\t\t\n<div class=\"fl-col-group fl-node-5ecf5fe26309c fl-col-group-equal-height fl-col-group-align-center fl-col-group-custom-width fl-col-group-responsive-reversed\" data-node=\"5ecf5fe26309c\">\n\t\t\t<div class=\"fl-col fl-node-5ecf5fe2634f2 fl-col-bg-color fl-col-small-custom-width\" data-node=\"5ecf5fe2634f2\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-heading fl-node-5ecf604a51283\" data-node=\"5ecf604a51283\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<h2 class=\"fl-heading\">\n\t\t<span class=\"fl-heading-text\">Security: The Most Important Factor Impacting the IoT in 2020 and Beyond<\/span>\n\t<\/h2>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-rich-text fl-node-5ecf607216b58\" data-node=\"5ecf607216b58\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-rich-text\">\n\t<p>If you'd like to use 2020 as an opportunity to finally secure your IoT infrastructure for all-time, great - that's exactly what we want too. I'd recommend contacting either myself or one of my colleagues at TSI so that we can find out more about your business and the IoT technology you rely upon. For additional insights into other TSI IoT resources, please refer to\u00a0<a href=\"https:\/\/tsisupport.com\/tsistaging\/congress-revisits-iot-legislation-what-you-need-to-know\/\">our resources IoT page here<\/a>.<\/p>\n<\/div>\n\t<\/div>\n<\/div>\n<div class=\"fl-module fl-module-button fl-node-5ecf60646e2d7 primary-btn\" data-node=\"5ecf60646e2d7\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div class=\"fl-button-wrap fl-button-width-auto fl-button-left\">\n\t\t\t<a href=\"https:\/\/tsisupport.com\/tsistaging\/contact\/\"  target=\"_self\"  class=\"fl-button\" >\n\t\t\t\t\t\t\t<span class=\"fl-button-text\">Get in touch with tsi<\/span>\n\t\t\t\t\t<\/a>\n<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t\t\t<div class=\"fl-col fl-node-5ecf5ff84ffd6 fl-col-bg-color fl-col-small fl-col-small-custom-width\" data-node=\"5ecf5ff84ffd6\">\n\t<div class=\"fl-col-content fl-node-content\"><div class=\"fl-module fl-module-photo fl-node-5ecf6029b0b95\" data-node=\"5ecf6029b0b95\">\n\t<div class=\"fl-module-content fl-node-content\">\n\t\t<div role=\"figure\" class=\"fl-photo fl-photo-align-right\" itemscope itemtype=\"https:\/\/schema.org\/ImageObject\">\n\t<div class=\"fl-photo-content fl-photo-img-png\">\n\t\t\t\t<img loading=\"lazy\" decoding=\"async\" class=\"fl-photo-img wp-image-819 size-full\" src=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/05\/blog-cta-building-upon-company-culture-remotely-img.png\" alt=\"blog-cta-building-upon-company-culture-remotely-img\" height=\"166\" width=\"206\" title=\"blog-cta-building-upon-company-culture-remotely-img\"  itemprop=\"image\" \/>\n\t\t\t\t\t<\/div>\n\t<\/div>\n\t<\/div>\n<\/div>\n<\/div>\n<\/div>\n\t<\/div>\n\t\t<\/div>\n\t<\/div>\n<\/div>\n<\/div><div class=\"uabb-js-breakpoint\" style=\"display: none;\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As someone who has been in the technology business for over 25 years, it&#8217;s safe to say that I&#8217;ve seen a lot of so-called tech trends come and go. But one that I find truly exciting is also one that is very much here to stay: IoT, also known as, the Internet of Things. In&hellip;<\/p>\n","protected":false},"author":7,"featured_media":8842,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"categories":[20],"tags":[],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI<\/title>\n<meta name=\"description\" content=\"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.\" \/>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI\" \/>\n<meta property=\"og:description\" content=\"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/tsisupport.com\/tsistaging\/?p=7969\" \/>\n<meta property=\"og:site_name\" content=\"TSI Support\" \/>\n<meta property=\"article:published_time\" content=\"2020-03-30T15:46:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-07T09:06:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1140\" \/>\n\t<meta property=\"og:image:height\" content=\"380\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jeremy Louise\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jeremy Louise\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"7 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969\",\"name\":\"IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI\",\"isPartOf\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage\"},\"image\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage\"},\"thumbnailUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg\",\"datePublished\":\"2020-03-30T15:46:47+00:00\",\"dateModified\":\"2021-07-07T09:06:04+00:00\",\"author\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\"},\"description\":\"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.\",\"breadcrumb\":{\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/tsisupport.com\/tsistaging\/?p=7969\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg\",\"contentUrl\":\"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg\",\"width\":1140,\"height\":380},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/?p=7969#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/tsisupport.com\/tsistaging\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protecting Against IoT Vulnerabilities: IoT Security Solutions in 2020\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#website\",\"url\":\"https:\/\/tsisupport.com\/tsistaging\/\",\"name\":\"TSI Support\",\"description\":\"TSI - Technical Support International\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926\",\"name\":\"Jeremy Louise\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g\",\"caption\":\"Jeremy Louise\"},\"url\":\"https:\/\/tsisupport.com\/tsistaging\/?author=7\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI","description":"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI","og_description":"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.","og_url":"https:\/\/tsisupport.com\/tsistaging\/?p=7969","og_site_name":"TSI Support","article_published_time":"2020-03-30T15:46:47+00:00","article_modified_time":"2021-07-07T09:06:04+00:00","og_image":[{"width":1140,"height":380,"url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg","type":"image\/jpeg"}],"author":"Jeremy Louise","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jeremy Louise","Est. reading time":"7 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969","url":"https:\/\/tsisupport.com\/tsistaging\/?p=7969","name":"IoT Security Solutions in 2020 | Understanding IoT Vulnerabilities | TSI","isPartOf":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#website"},"primaryImageOfPage":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage"},"image":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage"},"thumbnailUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg","datePublished":"2020-03-30T15:46:47+00:00","dateModified":"2021-07-07T09:06:04+00:00","author":{"@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926"},"description":"Learn about some of the critical IoT vulnerabilities you and your business should look out for as your devices become increasingly connected.","breadcrumb":{"@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/tsisupport.com\/tsistaging\/?p=7969"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969#primaryimage","url":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg","contentUrl":"https:\/\/tsisupport.com\/tsistaging\/wp-content\/uploads\/2020\/03\/Security-The-Most-Important-Factor-Impacting-banner.jpg","width":1140,"height":380},{"@type":"BreadcrumbList","@id":"https:\/\/tsisupport.com\/tsistaging\/?p=7969#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/tsisupport.com\/tsistaging\/"},{"@type":"ListItem","position":2,"name":"Protecting Against IoT Vulnerabilities: IoT Security Solutions in 2020"}]},{"@type":"WebSite","@id":"https:\/\/tsisupport.com\/tsistaging\/#website","url":"https:\/\/tsisupport.com\/tsistaging\/","name":"TSI Support","description":"TSI - Technical Support International","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/tsisupport.com\/tsistaging\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/48ad37aeeae9afb7d52479029f14f926","name":"Jeremy Louise","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/tsisupport.com\/tsistaging\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e2a1c4b01ee6c09554d8f086ff657b1a?s=96&d=mm&r=g","caption":"Jeremy Louise"},"url":"https:\/\/tsisupport.com\/tsistaging\/?author=7"}]}},"_links":{"self":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/7969"}],"collection":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=7969"}],"version-history":[{"count":0,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/posts\/7969\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=\/wp\/v2\/media\/8842"}],"wp:attachment":[{"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=7969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=7969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/tsisupport.com\/tsistaging\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=7969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}