{"id":243503,"date":"2025-01-30T22:57:08","date_gmt":"2025-01-30T22:57:08","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/"},"modified":"2025-01-30T22:57:08","modified_gmt":"2025-01-30T22:57:08","slug":"how-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/","title":{"rendered":"Setting Up Two-Factor Authentication for Enhanced Security"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of cybersecurity, the recent revelation of <strong>leaked passwords<\/strong> has raised alarms among users and experts alike. These passwords surfaced in a series of high-profile <strong>data breaches<\/strong>, where sensitive information from countless online accounts was compromised and made available on the dark web. This incident underscores the critical importance of safeguarding our <strong>digital identities<\/strong>, as leaked passwords can lead to <strong>unauthorized access<\/strong>, identity theft, and significant financial loss. For users, understanding the implications of these leaks is vital in reinforcing their online security measures, such as adopting practices like two-factor authentication (2FA) to add an extra layer of protection against potential threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Understanding_Two-Factor_Authentication_Basics\" >Understanding Two-Factor Authentication Basics<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Common_Types_of_2FA_Methods_Available_Today\" >Common Types of 2FA Methods Available Today<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Step-by-Step_Guide_to_Enabling_2FA\" >Step-by-Step Guide to Enabling 2FA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Best_Practices_for_Managing_Your_2FA_Setup\" >Best Practices for Managing Your 2FA Setup<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Security_Risks_and_How_to_Mitigate_Them\" >Security Risks and How to Mitigate Them<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Real-World_Benefits_and_Success_Stories\" >Real-World Benefits and Success Stories<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#What_Happens_if_Im_Traveling_Abroad_and_Cant_Receive_Authentication_Codes\" >What Happens if I&#039;m Traveling Abroad and Can&#039;t Receive Authentication Codes?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Can_I_Use_the_Same_Authenticator_App_for_Multiple_Services_Simultaneously\" >Can I Use the Same Authenticator App for Multiple Services Simultaneously?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#How_Do_I_Transfer_2FA_When_Switching_to_a_New_Phone\" >How Do I Transfer 2FA When Switching to a New Phone?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#What_Backup_Options_Exist_if_I_Lose_Both_My_Phone_and_Backup_Codes\" >What Backup Options Exist if I Lose Both My Phone and Backup Codes?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#Will_2FA_Still_Work_if_Im_in_an_Area_Without_Internet_Connection\" >Will 2FA Still Work if I&#039;m in an Area Without Internet Connection?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/how-two-factor-authentication\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Download and install a trusted authenticator app on your mobile device to generate secure, time-based verification codes.<\/li>\n<li>Access your account security settings and locate the two-factor authentication option to begin the setup process.<\/li>\n<li>Scan the provided QR code with your authenticator app to link it with your account for code generation.<\/li>\n<li>Store backup recovery codes in a safe place to ensure account access if you lose your authentication device.<\/li>\n<li>Choose authenticator apps over SMS verification for better security against potential phone number hijacking attempts.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Two-Factor_Authentication_Basics\"><\/span>Understanding Two-Factor Authentication Basics<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you go to your piggy bank, you probably use a special code or key to keep it safe. Well, that&#039;s kind of like what two-factor authentication (2FA) does for your online accounts!<\/p>\n<p>Think of it as having two <strong>secret handshakes<\/strong> instead of just one.<\/p>\n<p>Here&#039;s how it works: First, you enter your password (that&#039;s something you know). Then, you need a second <strong>special thing<\/strong> &#8211; like getting a <strong>secret code<\/strong> on your parent&#039;s phone or using your fingerprint (that&#039;s something you have or are). This extra step is crucial because it adds an important layer of <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-two-factor-authentication\/\">MFA security<\/a> to your accounts.<\/p>\n<p>It&#039;s like having a <strong>treasure chest<\/strong> that needs both a key and a special magic word to open it!<\/p>\n<p>Have you ever used an ATM card? That&#039;s 2FA too! You need the card AND a PIN number.<\/p>\n<p>Cool, right? This <strong>double-check<\/strong> helps keep bad guys from sneaking into your accounts. Using 2FA gives you <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/two-factor-authentication\">higher security protection<\/a> than just using a password alone.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Types_of_2FA_Methods_Available_Today\"><\/span>Common Types of 2FA Methods Available Today<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like choosing your favorite ice cream flavor, there are lots of fun ways to do <strong>two-factor authentication<\/strong>!<\/p>\n<p>Think of it as having a <strong>secret superhero identity<\/strong> with special powers to keep your stuff safe. You can pick the way that works best for you.<\/p>\n<p>Let me show you three super cool ways to prove it&#039;s really you:<\/p>\n<ol>\n<li>Use your fingerprint &#8211; it&#039;s like having a magical mark that only you have! This method enhances security by leveraging <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">biometric verification<\/a>, ensuring that only you can access your account.<\/li>\n<li>Get a special code sent to your phone &#8211; kind of like getting a secret message from a spy.<\/li>\n<li>Carry a tiny security key &#8211; imagine having a mini treasure chest key in your pocket.<\/li>\n<\/ol>\n<p>Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/rublon.com\/blog\/2fa-authentication-methods\/\">multiple security factors<\/a> makes your accounts much safer than passwords alone.<\/p>\n<p>Have you ever used any of these?<\/p>\n<p>They&#039;re like having different locks on your treehouse &#8211; the more locks you use, the safer your special things stay!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Step-by-Step_Guide_to_Enabling_2FA\"><\/span>Step-by-Step Guide to Enabling 2FA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that you know about all the super cool ways to do <strong>2FA<\/strong>, let&#039;s set it up together!<\/p>\n<p>It&#039;s just like following a treasure map to make your account super safe.<\/p>\n<p>First, grab your phone and download a special code-making app &#8211; I like to call it your &#034;digital bodyguard!&#034; This app typically generates a <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-vs-two-factor-authentication\/\">one-time code<\/a>, which is a key component of <strong>two-factor authentication<\/strong>.<\/p>\n<p>Then, hop over to your GitHub settings (it&#039;s hiding behind your profile picture). Click on &#034;Password and authentication&#034; &#8211; that&#039;s where the magic happens!<\/p>\n<p>Look for the &#034;Enable two-factor authentication&#034; button and click it.<\/p>\n<p>You&#039;ll see a funny-looking square pattern called a <strong>QR code<\/strong>. It&#039;s like a secret puzzle!<\/p>\n<p>Open your code app and scan it. Type in the <strong>special numbers<\/strong> it shows you, and boom &#8211; you&#039;re protected!<\/p>\n<p>Don&#039;t forget to save those <strong>recovery codes<\/strong> somewhere safe.<\/p>\n<p>As of March 2023, <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/docs.github.com\/en\/authentication\/securing-your-account-with-two-factor-authentication-2fa\/configuring-two-factor-authentication\">GitHub requires 2FA<\/a> for all code contributors on the platform.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Managing_Your_2FA_Setup\"><\/span>Best Practices for Managing Your 2FA Setup<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Managing your <strong>2FA setup<\/strong> is like taking care of your favorite toy &#8211; it needs regular checkups to stay awesome! Just like you brush your teeth every day, you&#039;ll want to check your 2FA settings regularly to keep the bad guys out.<\/p>\n<p>Think of it as having a <strong>super-secret clubhouse<\/strong> with special passwords! Modern security demands <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/rublon.com\/blog\/best-2fa-security-practices-2024\/\">zero trust architecture<\/a> to keep your digital fortress safe.<\/p>\n<p>Here are three cool things to remember:<\/p>\n<ol>\n<li>Use an authenticator app instead of text messages &#8211; it&#039;s like having a magical key that changes every minute!<\/li>\n<li>Pick strong passwords that mix letters, numbers, and symbols &#8211; imagine making the world&#039;s most uncrackable secret code.<\/li>\n<li>Check your login history often &#8211; it&#039;s like being a detective looking for sneaky footprints.<\/li>\n<\/ol>\n<p>Remember to update your authentication methods whenever there&#039;s something new and better.<\/p>\n<p>Isn&#039;t it fun being a <strong>digital superhero<\/strong>?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Risks_and_How_to_Mitigate_Them\"><\/span>Security Risks and How to Mitigate Them<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While <strong>2FA<\/strong> helps protect your digital fort, some sneaky attackers might try to break in!<\/p>\n<p>Just like a cat trying to catch a mouse, bad guys can be pretty clever. They might try to grab your <strong>special codes<\/strong> from text messages (that&#039;s called SMS) or trick you into sharing them.<\/p>\n<p>Want to stay extra safe? I&#039;ll tell you how!<\/p>\n<p>First, use an <strong>authenticator app<\/strong> instead of text messages &#8211; it&#039;s like having a secret decoder ring! <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/anderscpa.com\/why-sms-2fa-isnt-enough\/\">Hardware tokens<\/a> can be an even better choice for keeping your accounts secure.<\/p>\n<p>Next, <strong>never share<\/strong> your special codes with anyone, even if they say they&#039;re from your bank. Think of these codes like your lunch money &#8211; you wouldn&#039;t give that to strangers, right?<\/p>\n<p>Also, make sure you&#039;re using <strong>different passwords<\/strong> for all your accounts, just like you wear different outfits each day!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Real-World_Benefits_and_Success_Stories\"><\/span>Real-World Benefits and Success Stories<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let me share three <strong>amazing success stories<\/strong> about 2FA &#8211; it&#039;s like having a <strong>superhero shield<\/strong> for your online stuff! Did you know that one big company stopped almost all the bad guys from sneaking into their computers after they started using 2FA? That&#039;s like having an <strong>invisible force field<\/strong>!<\/p>\n<ol>\n<li>At SMU, over 4,400 students (that&#039;s more kids than 20 school playgrounds!) now use 2FA to keep their stuff safe.<\/li>\n<li>A huge company blocked 99.9% of robot attacks &#8211; imagine stopping 999 out of 1,000 bullies from stealing your lunch!<\/li>\n<li>Another company protected all their workers across different places, just like putting special locks on every classroom door in every school in town.<\/li>\n<\/ol>\n<p>Have you ever used 2FA? It&#039;s becoming as <strong>common as wearing a seatbelt<\/strong> in the car! Recent studies show that over 80% of data breaches could have been prevented with <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/supertokens.com\/blog\/benefits-of-multi-factor-authentication\">strong MFA protection<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_Im_Traveling_Abroad_and_Cant_Receive_Authentication_Codes\"><\/span>What Happens if I&#039;m Traveling Abroad and Can&#039;t Receive Authentication Codes?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry &#8211; I&#039;ve got tricks up my sleeve! Before traveling, I set up <strong>backup methods<\/strong> like authenticator apps or email verification.<\/p>\n<p>It&#039;s like having a spare key to your treehouse! I also tell my bank I&#039;m going on an <strong>adventure<\/strong>, so they won&#039;t get worried.<\/p>\n<p>If I can&#039;t get codes on my phone, I can use my email or even call my bank from anywhere in the world!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Use_the_Same_Authenticator_App_for_Multiple_Services_Simultaneously\"><\/span>Can I Use the Same Authenticator App for Multiple Services Simultaneously?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I use one <strong>authenticator app<\/strong> for lots of different things &#8211; just like having all my favorite toys in one big toy box!<\/p>\n<p>Think of it like a magic backpack that holds <strong>special codes<\/strong> for your email, games, and other fun stuff.<\/p>\n<p>Each service gets its own special spot in the app, and they all work together without getting mixed up &#8211; it&#039;s super handy!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_I_Transfer_2FA_When_Switching_to_a_New_Phone\"><\/span>How Do I Transfer 2FA When Switching to a New Phone?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll help you move your special security codes to your new phone &#8211; it&#039;s like moving your favorite toys to a new toybox!<\/p>\n<p>If you&#039;re using <strong>Google Authenticator<\/strong>, just open it on your old phone, tap the three dots, and choose &#034;Transfer.&#034;<\/p>\n<p>Then, your new phone can scan a special picture (like magic!) to get all your codes.<\/p>\n<p>For <strong>Microsoft Authenticator<\/strong>, it works similarly &#8211; open the app and look for &#034;Transfer to another device.&#034;<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Backup_Options_Exist_if_I_Lose_Both_My_Phone_and_Backup_Codes\"><\/span>What Backup Options Exist if I Lose Both My Phone and Backup Codes?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I know it&#039;s scary when you lose your phone and <strong>backup codes<\/strong>!<\/p>\n<p>Don&#039;t worry &#8211; you&#039;ve still got options. First, try contacting your <strong>account&#039;s support team<\/strong> with your ID proof.<\/p>\n<p>You can also use your backup email or trusted contacts to verify it&#039;s really you. If you set up a security key (like a special USB stick), that&#039;ll work too!<\/p>\n<p>Some services let you use your <strong>recovery email<\/strong> to reset everything.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Will_2FA_Still_Work_if_Im_in_an_Area_Without_Internet_Connection\"><\/span>Will 2FA Still Work if I&#039;m in an Area Without Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, your <strong>2FA<\/strong> will work offline!<\/p>\n<p>It&#039;s like having a special secret code machine in your pocket. <strong>Authenticator apps<\/strong> (like Google Authenticator) keep making new codes even without internet. They use your phone&#039;s clock to create these codes &#8211; just like a digital stopwatch!<\/p>\n<p>I use mine when I&#039;m camping in the woods or on airplane trips. Pretty cool, right?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up <strong>two-factor authentication<\/strong> is a crucial step in safeguarding your online presence, but it&#039;s only part of the equation. To ensure your accounts remain secure, you must also focus on <strong>password security<\/strong> and management. Weak or reused passwords can easily compromise even the strongest two-factor authentication. That&#039;s why utilizing a <strong>password manager<\/strong> is essential. This tool can help you create and store <strong>complex passwords<\/strong> securely, making it easier to maintain unique passwords for each of your accounts.<\/p>\n<p>If you&#039;re ready to take your security to the next level, consider using a <strong>reliable password management solution<\/strong>. By signing up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can effortlessly manage your passwords and passkeys, ensuring that your <strong>digital life remains protected<\/strong>. Don&#039;t wait until it&#039;s too late&#x2014;act now and empower yourself with the security tools you need!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Keep your digital life secure by mastering two-factor authentication &#8211; the modern way to guard against hackers and intruders.<\/p>\n","protected":false},"author":5,"featured_media":243502,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[975,6778,1788],"class_list":["post-243503","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-digital-security","tag-online-privacy","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243503","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=243503"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243503\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/243502"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=243503"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=243503"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=243503"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}