{"id":243918,"date":"2025-02-03T06:52:55","date_gmt":"2025-02-03T06:52:55","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/mfa-device\/"},"modified":"2025-02-03T06:52:55","modified_gmt":"2025-02-03T06:52:55","slug":"mfa-device","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-device\/","title":{"rendered":"What Is an MFA Device and How Does It Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, the issue of <strong>leaked passwords<\/strong> has become a pressing concern for <strong>cybersecurity<\/strong>. These passwords often appear in massive <strong>data breaches<\/strong>, circulating on <strong>dark web<\/strong> forums and being sold to cybercriminals, which raises alarm bells for users everywhere. The significance of leaked passwords cannot be overstated; they serve as gateways for unauthorized access to personal accounts, financial information, and sensitive data. For users, the relevance of understanding these leaks lies in the importance of adopting stronger security measures, such as multi-factor authentication (MFA), to safeguard their online presence and prevent becoming victims of <strong>identity theft<\/strong> or fraud.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Understanding_MFA_Device_Basics_and_Core_Functions\" >Understanding MFA Device Basics and Core Functions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Types_of_MFA_Authentication_Methods\" >Types of MFA Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#The_Technical_Process_Behind_MFA_Devices\" >The Technical Process Behind MFA Devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Security_Benefits_of_Using_MFA_Devices\" >Security Benefits of Using MFA Devices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Common_Challenges_and_Potential_Vulnerabilities\" >Common Challenges and Potential Vulnerabilities<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Best_Practices_for_MFA_Implementation\" >Best Practices for MFA Implementation<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Can_I_Use_MFA_Devices_When_Im_Traveling_Internationally\" >Can I Use MFA Devices When I&#039;m Traveling Internationally?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#What_Happens_if_I_Lose_My_MFA_Device\" >What Happens if I Lose My MFA Device?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#How_Much_Do_MFA_Devices_Typically_Cost_for_Individual_Users\" >How Much Do MFA Devices Typically Cost for Individual Users?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Can_Multiple_People_Share_the_Same_MFA_Device\" >Can Multiple People Share the Same MFA Device?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#Do_MFA_Devices_Work_if_Theres_No_Internet_Connection\" >Do MFA Devices Work if There&#039;s No Internet Connection?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/mfa-device\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>An MFA device is a security tool requiring multiple forms of verification beyond passwords to access accounts or systems.<\/li>\n<li>MFA uses a combination of something you know, have, and are (like passwords, phones, and fingerprints) for authentication.<\/li>\n<li>When logging in, users first enter their password, then complete a second verification step through the MFA device.<\/li>\n<li>MFA can use various methods including temporary codes sent via SMS, biometric scans, or physical security keys.<\/li>\n<li>This multi-layered approach blocks 99.9% of unauthorized access attempts, making accounts significantly more secure than password-only protection.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_MFA_Device_Basics_and_Core_Functions\"><\/span>Understanding MFA Device Basics and Core Functions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you hear &#034;MFA device,&#034; think of it like having a special <strong>superhero sidekick<\/strong> for your password! It&#039;s there to make sure you&#039;re really you when you log into your favorite games or apps.<\/p>\n<p>I&#039;ll tell you a secret &#8211; it&#039;s like having a <strong>two-part handshake<\/strong>! First, you type in your password, and then your <strong>MFA device<\/strong> helps prove it&#039;s actually you. It might be a tiny gadget that shows special numbers, or maybe it scans your fingerprint &#8211; just like a detective! Using MFA can <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/multifactor-authentication-MFA\">reduce security breaches<\/a> by up to 99.9% compared to using passwords alone. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-two-factor-authentication\/\">MFA acts as a security checkpoint<\/a>, ensuring that even if someone has your password, they still cannot access your account without the second factor.<\/p>\n<p>Have you ever used a <strong>secret decoder ring<\/strong>? It&#039;s kind of like that!<\/p>\n<p>Some MFA devices work through your phone, sending you special codes by text. Others might look at your face or check your fingerprint. Pretty cool, right? It&#039;s like having your own <strong>personal security guard<\/strong> keeping all your stuff safe!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Types_of_MFA_Authentication_Methods\"><\/span>Types of MFA Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s explore the super cool ways <strong>MFA<\/strong> keeps you safe!<\/p>\n<p>Think of MFA like having different <strong>secret superhero powers<\/strong> to protect your stuff. I&#039;ll show you four amazing ways it works!<\/p>\n<p>First, there&#039;s the &#034;what you know&#034; power &#8211; like passwords and special questions (just like having a secret clubhouse code!). This method is crucial because it forms the basis of <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">single-factor authentication<\/a>, which is less secure on its own.<\/p>\n<p>Then there&#039;s &#034;what you have&#034; power &#8211; like using your mom&#039;s phone or a special key card.<\/p>\n<p>The third is my favorite &#8211; &#034;what you are&#034; power, using your fingerprint or face (like a spy movie!).<\/p>\n<p>Last but not least, there&#039;s &#034;where you are&#034; power, which checks if you&#039;re in the right place, like being on your home WiFi.<\/p>\n<p>Microsoft recommends using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/sr-cyrl-rs\/entra\/identity\/authentication\/concept-authentication-methods\">Windows Hello<\/a> and other passwordless methods for the strongest security.<\/p>\n<p>What&#039;s your favorite way to access things? Have you ever used your fingerprint to open a phone?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Technical_Process_Behind_MFA_Devices\"><\/span>The Technical Process Behind MFA Devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>MFA devices work like a super-secret treehouse that needs <strong>special passwords<\/strong> to enter! You know how you need a special handshake to join your friend&#039;s club? MFA works just like that, but it&#039;s even cooler!<\/p>\n<p>First, you&#039;ll type in your username and password &#8211; that&#039;s like knowing the special knock on the treehouse door.<\/p>\n<p>Then comes the fun part! You&#039;ll get a <strong>secret code<\/strong> on your phone or email, kind of like getting a treasure map clue. Sometimes, you might even use your <strong>fingerprint or face<\/strong>, just like a spy! This process adds an extra layer of security against <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/microsoft-mfa-site\/\">unauthorized access<\/a>, ensuring that only you can enter your digital space.<\/p>\n<p>The best part? These secret codes change all the time, so bad guys can&#039;t steal them. It&#039;s like having a <strong>magic password<\/strong> that transforms every minute! Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.rsa.com\/resources\/blog\/multi-factor-authentication\/what-is-mfa\/\">device-bound passkeys<\/a> helps keep your information extra safe.<\/p>\n<p>Have you ever played &#034;Simon Says&#034;? MFA is similar &#8211; you have to follow <strong>specific steps<\/strong> to prove it&#039;s really you.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Benefits_of_Using_MFA_Devices\"><\/span>Security Benefits of Using MFA Devices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Want to know why using <strong>MFA devices<\/strong> is super cool for keeping your stuff safe? It&#039;s like having a <strong>special fortress<\/strong> for your games and apps! Instead of just using one key to get in, you need two or three different keys. Cool, right?<\/p>\n<p>Think of it like your favorite pizza place. They don&#039;t just put cheese on top &#8211; they add pepperoni, mushrooms, and other yummy toppings to make it better. MFA works the same way! It adds <strong>extra layers of protection<\/strong>, just like those extra toppings.<\/p>\n<p>Even if someone <strong>steals your password<\/strong> (that&#039;s one topping), they still can&#039;t get in without the other special ingredients.<\/p>\n<p>And here&#039;s the best part &#8211; MFA blocks almost all the bad guys trying to sneak into your account. It&#039;s like having a <strong>super-powered shield<\/strong> around your stuff! According to experts, MFA stops <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/supertokens.com\/blog\/benefits-of-multi-factor-authentication\">99.9% of attacks<\/a> trying to break into accounts.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Common_Challenges_and_Potential_Vulnerabilities\"><\/span>Common Challenges and Potential Vulnerabilities<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While using <strong>MFA<\/strong> is super awesome for keeping your accounts safe, it can sometimes feel like trying to solve a <strong>tricky puzzle<\/strong>!<\/p>\n<p>You know how sometimes your favorite game won&#039;t work on an old phone? That&#039;s like when MFA doesn&#039;t work on <strong>certain devices<\/strong>.<\/p>\n<p>Sometimes it&#039;s like learning a new board game &#8211; it takes time to understand all the rules! Multiple <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/jumpcloud.com\/blog\/the-human-challenges-of-rolling-out-multi-factor-authentication-mfa\">training formats and guides<\/a> can help make the learning process easier for everyone.<\/p>\n<p>And just like when someone tries to trick you into sharing your lunch, <strong>bad guys<\/strong> might try to trick you into sharing your MFA codes. Yikes!<\/p>\n<p>The good news is that we can make MFA work better by learning about it (kind of like practicing for a big game) and using different types of security (like having both a password AND your <strong>fingerprint<\/strong>).<\/p>\n<p>Have you ever used your fingerprint to access something? That&#039;s MFA in action!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_MFA_Implementation\"><\/span>Best Practices for MFA Implementation<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up <strong>MFA<\/strong> is like building the ultimate treehouse &#8211; it needs <strong>careful planning<\/strong> and the right tools! Just like how you need a <strong>strong ladder<\/strong> to climb up safely, I&#039;ll help you make MFA super secure.<\/p>\n<p>First, I make sure to train everyone who&#039;ll use MFA &#8211; it&#039;s like teaching your friends the rules of a new game! I start with the most important accounts (like your favorite toy that needs extra protection), and then work my way down to other stuff.<\/p>\n<p>Want to know my secret recipe for MFA success? I use different types of login methods (like mixing sprinkles and chocolate chips on ice cream), keep <strong>backup plans<\/strong> ready (just in case!), and check regularly to make sure everything&#039;s working perfectly. Studies show that implementing <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/nordlayer.com\/blog\/multi-factor-authentication-best-practices\/\">multi-factor authentication<\/a> can prevent over 90% of account attacks.<\/p>\n<p>Isn&#039;t <strong>cybersecurity<\/strong> fun when we make it this simple?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Use_MFA_Devices_When_Im_Traveling_Internationally\"><\/span>Can I Use MFA Devices When I&#039;m Traveling Internationally?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, you can use <strong>MFA devices<\/strong> when traveling internationally!<\/p>\n<p>I recommend using authenticator apps or hardware tokens since they work anywhere without extra fees. Text message codes might cost more abroad unless you get a local SIM card.<\/p>\n<p>Before you travel, I always set up <strong>backup methods<\/strong> and test them. It&#039;s like having a spare key &#8211; you&#039;ll be glad you did!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_My_MFA_Device\"><\/span>What Happens if I Lose My MFA Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry if you lose your <strong>MFA device<\/strong>!<\/p>\n<p>First, go to AWS and verify your email and phone. I&#039;ll help you fix it. Think of it like losing your house key &#8211; there&#039;s always a backup plan!<\/p>\n<p>Next, you&#039;ll remove the <strong>lost device<\/strong> from your account. Then, set up a new one right away.<\/p>\n<p>It&#039;s smart to have <strong>backup codes<\/strong> stored safely, just like keeping a spare key with a trusted neighbor.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Do_MFA_Devices_Typically_Cost_for_Individual_Users\"><\/span>How Much Do MFA Devices Typically Cost for Individual Users?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>MFA devices can be really affordable! Most phone apps like <strong>Google Authenticator<\/strong> or Microsoft Authenticator are free to use.<\/p>\n<p>If you want a physical key, like YubiKey, they usually cost between $25-$50. Hardware tokens with little screens that show codes cost about $20-$30.<\/p>\n<p>I&#039;d recommend starting with the <strong>free phone apps<\/strong> &#8211; they work great and won&#039;t cost you anything!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Multiple_People_Share_the_Same_MFA_Device\"><\/span>Can Multiple People Share the Same MFA Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I wouldn&#039;t recommend <strong>sharing<\/strong> an <strong>MFA device<\/strong>! It&#039;s like sharing your secret diary key &#8211; not a good idea!<\/p>\n<p>When multiple people use the same device, it&#039;s harder to know who did what. Think of it like having one lunch card for your whole class &#8211; it&#039;d be super <strong>confusing<\/strong>!<\/p>\n<p>Instead, everyone should have their own MFA device, just like how you have your own special backpack at school.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Do_MFA_Devices_Work_if_Theres_No_Internet_Connection\"><\/span>Do MFA Devices Work if There&#039;s No Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ve got great news! <strong>MFA devices<\/strong> can work without internet, but they need to be set up first when you&#039;re online.<\/p>\n<p>Think of it like packing a lunchbox &#8211; you fill it up at home, then use it later at school!<\/p>\n<p>Some MFA types, like <strong>authenticator apps<\/strong>, work offline by using special codes stored on your phone.<\/p>\n<p>Others might need <strong>special software<\/strong> on your computer to help them work without internet.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>MFA devices serve as a formidable line of defense in your digital security, but they are just one piece of the puzzle. To truly protect your online presence, it&#039;s essential to focus on <strong>password security<\/strong>, management, and the emerging concept of <strong>passkeys<\/strong>. Strong, unique passwords are your first line of defense, but remembering them can be a challenge. That&#039;s where effective <strong>password management<\/strong> comes in. By utilizing a <strong>password manager<\/strong>, you can securely store, generate, and manage your passwords with ease.<\/p>\n<p>It&#039;s time to take control of your <strong>online security<\/strong>. I encourage you to explore solutions that simplify your password management and enhance your security with features like encryption and one-click access. Check out how <strong>LogMeOnce<\/strong> can help streamline your security measures and protect your accounts. Sign up for a free account today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and take the first step towards a safer digital life!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Two-factor authentication devices add an extra security layer to passwords, but how exactly do they protect your digital life?<\/p>\n","protected":false},"author":5,"featured_media":243917,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[975,36351,1788],"class_list":["post-243918","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-digital-security","tag-mfa-device-2","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243918","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=243918"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243918\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/243917"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=243918"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=243918"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=243918"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}