{"id":11165,"date":"2024-06-08T19:43:31","date_gmt":"2024-06-08T19:43:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/06\/22\/microsoft-password-best-practices\/---3f4352ae-9f36-4fb6-b5a4-7e380c11effb"},"modified":"2024-08-16T11:14:53","modified_gmt":"2024-08-16T11:14:53","slug":"microsoft-password-best-practices","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/","title":{"rendered":"Microsoft Password Best Practices"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Are you committed to safeguarding your individual or company data? Ensure the protection of your essential information by adhering to Microsoft Password Best Practices! Given the increasing prevalence of cybercriminal activities, it&#8217;s crucial to be proactive and follow Microsoft&#8217;s recommendations for password creation. Microsoft Password Best Practices offer comprehensive advice on establishing strong, secure passwords that need regular modifications and refreshment. Additionally, they provide guidance on implementing two-factor authentication for extra security measures. By adopting Microsoft Password Best Practices, you can guarantee the safety of your data against harmful cyber intruders.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#1_%E2%80%9CUnlock_Your_Device_with_a_Secure_Password_Microsofts_Best_Practices%E2%80%9D\" >1. \u201cUnlock Your Device with a Secure Password: Microsoft\u2019s Best Practices\u201d<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#2_%E2%80%9CTips_to_Create_a_Strong_Password_that_Keeps_Your_Data_Safe%E2%80%9D\" >2. \u201cTips to Create a Strong Password that Keeps Your Data Safe\u201d<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#3_%E2%80%9CThe_Benefits_of_Sticking_to_Suggested_Microsoft_Password_Practices%E2%80%9D\" >3. \u201cThe Benefits of Sticking to Suggested Microsoft Password Practices\u201d<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#4_%E2%80%9CStay_Secure_Practicing_Good_Password_Habits_with_Microsoft\" >4. \u201cStay Secure: Practicing Good Password Habits with Microsoft<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Microsoft_Password_Best_Practices\" >Microsoft Password Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_A\" >Q&amp;A<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_What_are_some_best_practices_for_creating_and_using_strong_passwords_on_Microsoft\" >Q: What are some best practices for creating and using strong passwords on Microsoft?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_What_is_a_password_expiration_policy\" >Q: What is a password expiration policy?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_Why_is_having_strong_password_policies_important\" >Q: Why is having strong password policies important?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_What_is_multi-factor_authentication_MFA\" >Q: What is multi-factor authentication (MFA)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_How_do_weak_passwords_make_accounts_vulnerable\" >Q: How do weak passwords make accounts vulnerable?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Q_What_are_some_common_password_recommendations_for_maintaining_security\" >Q: What are some common password recommendations for maintaining security?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlock-your-device-with-a-secure-password-microsofts-best-practices\"><span class=\"ez-toc-section\" id=\"1_%E2%80%9CUnlock_Your_Device_with_a_Secure_Password_Microsofts_Best_Practices%E2%80%9D\"><\/span>1. \u201cUnlock Your Device with a Secure Password: Microsoft\u2019s Best Practices\u201d<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Having a secure password is a key element in protecting your device and data. Microsoft recommends these best practices to create a secure password you can remember:<\/p>\n<ul>\n<li>Make it at least 8 characters long.<\/li>\n<li>Use a combination of letters, numbers, and symbols.<\/li>\n<li>Avoid words from the dictionary &amp; common phrases.<\/li>\n<li>Do not use personal information, such as your name or birthday.<\/li>\n<\/ul>\n<p><strong>It\u2019s also important to update your password regularly to make sure it is as secure as possible.<\/strong> Try using a passphrase rather than a single password. Passphrases are an easy way to create memories and stores more complicated passwords without affecting memorability. Plus, it provides a stronger security barrier for fraudsters to break down. A good passphrase might include a phrase, sentence, or lyric that means something to you, combined with numbers and symbols.<\/p>\n<h2 id=\"2-tips-to-create-a-strong-password-that-keeps-your-data-safe\"><span class=\"ez-toc-section\" id=\"2_%E2%80%9CTips_to_Create_a_Strong_Password_that_Keeps_Your_Data_Safe%E2%80%9D\"><\/span>2. \u201cTips to Create a Strong Password that Keeps Your Data Safe\u201d<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Creating a Secure Password<\/b><\/p>\n<p>Creating a strong password is an important part of keeping your data safe and secure online. With these simple tips, you can make sure your data stays safe from cyber attacks.<\/p>\n<ul>\n<li>Make it longer: Always aim for a password that is at least 12 characters long. Every additional character makes your password that much harder to crack.<\/li>\n<li>Include a mix of numbers, symbols, lowercase and uppercase letters: A good password will have all of these elements, and some websites even require a mixture of these elements.<\/li>\n<li>Avoid phrases: It may be easier and faster to create a password that is a phrase, but these types of combinations are much easier to guess.<\/li>\n<li>Change it up: It is important to switch up your passwords every few months. That way, even if a hacker hacks into one of your accounts, they won\u2019t be able to access the others.<\/li>\n<li>Don\u2019t use personal information: Refrain from using birthdays, family names, the name of your pet, or other obvious personal details when coming up with a password.<\/li>\n<li>Write down your passwords: To make sure you don\u2019t forget any of your passwords, it can be helpful to write them down on a piece of paper in a safe place.<\/li>\n<li>Use a password manager: Password managers such as or KeePass can be used to store and lock passwords away securely. You\u2019ll only have to remember a single master password.<\/li>\n<\/ul>\n<p>Finally, do your best to create a unique password for each and every website that requires one. This way, your data will be even more secure, as hackers won\u2019t be able to use the same password for a different website.<\/p>\n<h2 id=\"3-the-benefits-of-sticking-to-suggested-microsoft-password-practices\"><span class=\"ez-toc-section\" id=\"3_%E2%80%9CThe_Benefits_of_Sticking_to_Suggested_Microsoft_Password_Practices%E2%80%9D\"><\/span>3. \u201cThe Benefits of Sticking to Suggested Microsoft Password Practices\u201d<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Stick to Highly Recommended Password Practices for Optimum Security<\/b><\/p>\n<p>Improving your technology security should be a top priority. Microsoft offers straightforward practical tips for selecting passwords that protect your account and keep your information safe. By following the company\u2019s guidelines for creating passwords, you can ensure that your data remains secure.<\/p>\n<p>Someone trying to break into a Microsoft account needs to guess not only the correct set of characters you have used, but also the type of characters you have used. Microsoft recommends using a mixture of upper and lower-case letters, numbers, and symbols in order to lock down your account. Also, remember to create a password that is long enough to be secure. Passwords over 15 characters long are recommended. Here are some other key points to consider:<br \/>\n\u2013 Make passwords that are impossible to guess<br \/>\n\u2013 Avoid common words, dates, or basic terms<br \/>\n\u2013 Don\u2019t re-use passwords for multiple accounts<br \/>\n\u2013 Change passwords regularly<\/p>\n<p>Follow these recommended Microsoft password practices to fortify the security of your account and data. A strong password will help protect your information and give you peace of mind.<\/p>\n<h2 id=\"4-stay-secure-practicing-good-password-habits-with-microsoft\"><span class=\"ez-toc-section\" id=\"4_%E2%80%9CStay_Secure_Practicing_Good_Password_Habits_with_Microsoft\"><\/span>4. \u201cStay Secure: Practicing Good Password Habits with Microsoft<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you use your Microsoft account for logging into your computer and various services, it\u2019s important to keep your information secure with strong passwords. Poor password habits can make you vulnerable to cyber threats, making it essential to <a title=\"Microsoft Password Best Practices\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/\" data-abc=\"true\">practice good password tactics<\/a>.<\/p>\n<p>When you want to stay secure, here are 4 tips to consider:<\/p>\n<ul>\n<li><strong>Don\u2019t use the same password everywhere<\/strong>. Don\u2019t make it easy for hackers to guess your password by using the same one across different accounts. Instead, create a unique password for each account or service.<\/li>\n<li><strong>Create strong passwords<\/strong>. Make your account more difficult to break into with a strong password. Your password can include upper and lowercase letters, numbers, and special characters for added security.<\/li>\n<li><strong>Avoid common phrases<\/strong>. Don\u2019t make it easy to guess your password by using common words and phrases. Instead, combine random words to form a phrase no one would guess.<\/li>\n<li><strong>Change your password regularly<\/strong>. Change your password every few months to further reduce the likelihood of your account being hacked.<\/li>\n<\/ul>\n<p>Doing these simple things can make a big difference in keeping your account safe. Microsoft provides additional password advice for staying secure, so make sure to check that out too.<\/p>\n<p>A strong password policy is essential for ensuring the security of online accounts and protecting sensitive information from cyberattacks. Password expiration policies, minimum password requirements, and multi-factor authentication are commonly used measures to enhance password security. Cybersecurity experts recommend using complex and unique passwords to prevent brute force attacks and dictionary attacks. The Federal Trade Commission emphasizes the importance of regular password resets and avoiding common passwords to reduce the risk of unauthorized access to accounts. Implementing stringent password requirements, such as minimum length and complexity rules, can significantly mitigate the risk of compromised passwords and unauthorized access. Additionally, organizations are advised to educate employees on best practices for creating and managing passwords, as human behavior is often a weak link in password security. By implementing effective password protection features and regularly monitoring account activity, businesses can strengthen their overall security posture and mitigate the risk of successful cyberattacks.<\/p>\n<p>Password complexity requirements are a critical component of ensuring the security of user accounts within organizations. Strong passwords are essential to protect against vulnerable passwords and brute force password attacks. Multi-factor authentication adds an extra layer of security by requiring additional verification beyond just a password, such as a code sent to a user&#8217;s phone. Active Directory is a commonly used tool for managing user accounts and access to resources within an organization.<\/p>\n<p>Having password guidance in place, including password length requirements and periodic password resets, can help prevent unauthorized access to sensitive information. It is important for organizations to be aware of common user passwords and ensure that their password policies address the issue of predictable passwords.<\/p>\n<p>Implementing a password hash can add an additional layer of security by encrypting passwords stored within a system. Organizations should also be vigilant for suspicious activity, such as multiple failed login attempts, which may indicate a potential security breach.<\/p>\n<p>Multi-factor authentication, also known as MFA, is a vital tool in ensuring the security of user accounts in organizations. By requiring users to provide multiple forms of verification before gaining access, such as a password and a one-time code sent to their phone, MFA significantly reduces the risk of unauthorized access. Along with using strong, memorable passwords and following password guidelines, implementing a solid password policy is essential for maintaining the security of sensitive data. Organizations should consider recommendations for password complexity requirements, expiration settings, and more to ensure that their passwords are as secure as possible. It is crucial for businesses to regularly review and update their password policies to stay ahead of evolving cybersecurity threats.<\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure that organizations should implement to protect their sensitive information. A password list is a common tool used for managing and storing passwords within an organization. It is important to establish a strong password policy that includes recommendations such as using random passwords, enforcing password resets for user accounts, and prohibiting the reuse of previous passwords. Furthermore, utilizing multifactor authentication and authentication methods can help verify the legitimate account owner and prevent unauthorized access. It is also essential to secure service accounts and ensure default values are properly configured in the default domain policy.<\/p>\n<p>Lorrie Cranor, a renowned expert in cybersecurity, emphasizes the importance of password complexity requirements and the use of non-alphanumeric characters to enhance security. Additionally, organizations should be cautious of social engineering tactics, such as phishing scams, which can compromise user accounts. By implementing comprehensive security strategies and monitoring access activities, businesses can effectively protect their data and prevent successful attacks on their systems. Sources: Lorrie Cranor &#8211; Carnegie Mellon University, Cybersecurity Baseline &#8211; National Institute of Standards and Technology.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Microsoft_Password_Best_Practices\"><\/span>Microsoft Password Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Recommendation<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Make it at least 8 characters long<\/td>\n<td>Use a combination of letters, numbers, and symbols<\/td>\n<\/tr>\n<tr>\n<td>Avoid using personal information<\/td>\n<td>Update your password regularly<\/td>\n<\/tr>\n<tr>\n<td>Use a passphrase<\/td>\n<td>Create a memorable yet strong password<\/td>\n<\/tr>\n<tr>\n<td>Make passwords at least 12 characters long<\/td>\n<td>Include a mix of numbers, symbols, lowercase and uppercase letters<\/td>\n<\/tr>\n<tr>\n<td>Avoid common phrases<\/td>\n<td>Change your password regularly<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_best_practices_for_creating_and_using_strong_passwords_on_Microsoft\"><\/span>Q: What are some best practices for creating and using strong passwords on Microsoft?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Creating and using strong passwords for your Microsoft accounts can help keep your information and data secure. Best practices include: using a combination of upper and lower case letters, numbers, and symbols; making sure your passwords are at least 8 characters long; never sharing your passwords; and using unique passwords for each account. Additionally, regularly updating your passwords is a great way to keep your accounts safe and secure.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_a_password_expiration_policy\"><\/span>Q: What is a password expiration policy?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: A password expiration policy is a set of rules dictating how frequently a user must change their password to maintain security. This policy helps protect against unauthorized access and potential breaches by regularly updating passwords. (Source: National Institute of Standards and Technology)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_Why_is_having_strong_password_policies_important\"><\/span>\nQ: Why is having strong password policies important?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Strong password policies are important because they help prevent unauthorized access to sensitive information. By requiring complex passwords with a mix of characters, organizations can enhance their overall cybersecurity posture and protect against brute force attacks. (Source: Cybersecurity and Infrastructure Security Agency)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_is_multi-factor_authentication_MFA\"><\/span>\nQ: What is multi-factor authentication (MFA)?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Multi-factor authentication is a security measure that requires users to provide two or more forms of verification before accessing an account or system. This adds an extra layer of security beyond just a password to help prevent unauthorized access. (Source: Federal Trade Commission)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_How_do_weak_passwords_make_accounts_vulnerable\"><\/span>Q: How do weak passwords make accounts vulnerable?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Weak passwords make accounts vulnerable because they are easily guessed or cracked by attackers. Common passwords, like &#8220;123456&#8221; or &#8220;password,&#8221; are particularly risky as they provide little protection against brute force attacks or dictionary attacks. (Source: Verizon Data Breach Investigations Report)<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Q_What_are_some_common_password_recommendations_for_maintaining_security\"><\/span>\nQ: What are some common password recommendations for maintaining security?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>A: Some common password recommendations include using complex passwords with a mix of characters, avoiding easily guessable passwords, enabling multi-factor authentication, and regularly updating passwords according to password expiration policies. (Source: National Cyber Security Centre)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>For secure storage of your Microsoft passwords, a free <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> account is your best bet. With enterprise-level security, LogMeOnce offers an additional layer of protection, ensuring adherence to Microsoft password best practices. It simplifies password management, enabling automatic registration, login, and encrypted storage for secure access. Trust LogMeOnce to streamline implementation and safeguard your valuable data with confidence.<\/p>\n<p><strong>Reference:<\/strong> <a href=\"https:\/\/logmeonce.com\/resources\/microsoft-password-best-practices\/\" target=\"_new\" rel=\"noopener\" data-abc=\"true\">Microsoft Password Best Practices<\/a><\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover Microsoft password best practices! Optimize security with a FREE LogMeOnce account featuring Auto-login, SSO, and Identity Theft Protection.<\/p>\n","protected":false},"author":20,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[6444,2286,1741,783,781],"class_list":["post-11165","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-microsoft-2","tag-account-protection","tag-best-practices","tag-password","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/11165","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/20"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=11165"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/11165\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=11165"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=11165"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=11165"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}