{"id":243938,"date":"2025-02-03T09:16:35","date_gmt":"2025-02-03T09:16:35","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/"},"modified":"2025-02-03T09:16:35","modified_gmt":"2025-02-03T09:16:35","slug":"mfa-implementation-2","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/","title":{"rendered":"Easy MFA Implementation: Your How-To Guide"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, <strong>leaked passwords<\/strong> pose a significant threat to <strong>cybersecurity<\/strong>, as they often emerge from <strong>data breaches<\/strong> involving popular websites and services. These leaks can occur through various channels such as <strong>hacking incidents<\/strong>, phishing attacks, or insecure data storage practices, and they frequently surface on the dark web or in publicly accessible databases. The significance of leaked passwords lies in their potential to compromise user accounts, leading to <strong>identity theft<\/strong> and unauthorized access to sensitive information. For users, understanding the prevalence and impact of these leaks is crucial for adopting better security practices, such as implementing multi-factor authentication (MFA) to safeguard their accounts against unauthorized access.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Understanding_Your_MFA_Requirements\" >Understanding Your MFA Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Building_Your_MFA_Implementation_Strategy\" >Building Your MFA Implementation Strategy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Setting_Up_Your_MFA_Infrastructure\" >Setting Up Your MFA Infrastructure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Training_Your_Team_for_MFA_Success\" >Training Your Team for MFA Success<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Maintaining_and_Optimizing_Your_MFA_System\" >Maintaining and Optimizing Your MFA System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#What_Happens_if_I_Lose_My_Authentication_Device_During_Travel\" >What Happens if I Lose My Authentication Device During Travel?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Can_MFA_Be_Temporarily_Disabled_for_Specific_Users_or_Circumstances\" >Can MFA Be Temporarily Disabled for Specific Users or Circumstances?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#How_Does_MFA_Work_When_Theres_No_Internet_Connection\" >How Does MFA Work When There&#039;s No Internet Connection?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Will_MFA_Slow_Down_Our_Emergency_Response_Times_During_System_Issues\" >Will MFA Slow Down Our Emergency Response Times During System Issues?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#Does_Implementing_MFA_Affect_Our_Existing_Software_Licensing_Agreements\" >Does Implementing MFA Affect Our Existing Software Licensing Agreements?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/mfa-implementation-2\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Choose user-friendly MFA solutions like Google Authenticator or YubiKey to simplify the setup process for your team.<\/li>\n<li>Begin implementation with critical accounts first, then gradually expand to other users through pilot testing.<\/li>\n<li>Provide clear training materials and video tutorials to help users understand and adopt MFA effectively.<\/li>\n<li>Ensure compatibility between your existing security infrastructure and chosen MFA solution before deployment.<\/li>\n<li>Establish a support system and backup plans to handle technical issues during the implementation process.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Your_MFA_Requirements\"><\/span>Understanding Your MFA Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s talk about something super important called <strong>MFA<\/strong> &#8211; that&#039;s like having a <strong>special secret code<\/strong> to keep your stuff safe! You know how you need both a key and a password to open your treasure chest? MFA works just like that!<\/p>\n<p>First, we need to check what <strong>rules<\/strong> we&#039;ve to follow. It&#039;s like when you play a game &#8211; there are always rules, right? Some places, like hospitals and banks, have extra-special rules to protect people&#039;s information.<\/p>\n<p>Then, we look at what your team needs. Maybe you&#039;re already using some cool <strong>security tools<\/strong>? We&#039;ll make sure everything works together, just like putting together your favorite LEGO sets! Popular solutions like <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.pixelfreestudio.com\/how-to-implement-multi-factor-authentication-for-web-security\/\">Google Authenticator and YubiKey<\/a> can make implementation easier.<\/p>\n<p>The most important part? Making sure it&#039;s <strong>easy for everyone to use<\/strong>. Would you want a lock that&#039;s too tricky to open?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Building_Your_MFA_Implementation_Strategy\"><\/span>Building Your MFA Implementation Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While planning to keep our digital treasures safe, let&#039;s create a <strong>super-smart battle plan<\/strong> for <strong>MFA<\/strong>! Think of it like building the world&#039;s coolest fortress to protect your favorite toys.<\/p>\n<p>First, we&#039;ll start small &#8211; just like eating a giant sandwich one bite at a time! We&#039;ll begin with the <strong>most important accounts<\/strong>, like your teachers&#039; emails.<\/p>\n<p>Then, we&#039;ll make sure everyone knows how to use MFA (it&#039;s like having a <strong>secret handshake AND a password<\/strong>). We&#039;ll focus on providing <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/101152-top-8-tips-for-implementing-mfa-effectively\">engaging training sessions<\/a> to help everyone understand the new system and the importance of <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/when-to-use-mfa\/\">multi-factor authentication<\/a> in securing their accounts.<\/p>\n<p>Want to know what makes this plan extra awesome? We&#039;ll test it with a small group first, just like trying out a new game at recess.<\/p>\n<p>That way, we can <strong>fix any problems<\/strong> before everyone starts using it. Plus, we&#039;ll keep checking to make sure it works better than a triple-scoop ice cream cone!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_Your_MFA_Infrastructure\"><\/span>Setting Up Your MFA Infrastructure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before we start building our MFA fortress, let&#039;s get all our superhero tools ready! Just like you need the right LEGO pieces to build an awesome castle, we need the right tech pieces for our security masterpiece. Let&#039;s make sure everything fits together perfectly! The best way to begin is with a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/instasafe.com\/blog\/deploying-an-effective-mfa-setup\/\">pilot group testing<\/a> to ensure a smooth rollout.<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">What We Need<\/th>\n<th style=\"text-align: center\">Why It&#039;s Cool<\/th>\n<th style=\"text-align: center\">How to Get It<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">New Software<\/td>\n<td style=\"text-align: center\">Makes things work smoothly<\/td>\n<td style=\"text-align: center\">Download updates<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Special Tools<\/td>\n<td style=\"text-align: center\">Keeps bad guys out<\/td>\n<td style=\"text-align: center\">Choose what fits<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Safety Checks<\/td>\n<td style=\"text-align: center\">Like a security guard<\/td>\n<td style=\"text-align: center\">Test everything<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Growing Room<\/td>\n<td style=\"text-align: center\">Space to add more<\/td>\n<td style=\"text-align: center\">Plan ahead<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Backup Plan<\/td>\n<td style=\"text-align: center\">Just in case!<\/td>\n<td style=\"text-align: center\">Have extras<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Have you ever played Jenga? That&#039;s kind of like what we&#039;re doing &#8211; making sure every piece is strong and in the right place. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/security-mfa\/\">MFA enhances security<\/a> beyond traditional password protection, helping to safeguard sensitive information in various contexts. We&#039;ll check all our systems, just like checking if your bike&#039;s ready for a ride. Ready to be a security superhero?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Training_Your_Team_for_MFA_Success\"><\/span>Training Your Team for MFA Success<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Since getting everyone on board with <strong>MFA<\/strong> is like teaching a new game at recess, let&#039;s make it super <strong>fun<\/strong>!<\/p>\n<p>I&#039;ll help you train your team step by step, just like showing friends how to play hopscotch. First, tell everyone about MFA early &#8211; it&#039;s like giving a heads-up about an awesome new playground game!<\/p>\n<p>Send them <strong>helpful videos<\/strong> and emails that explain how MFA works. It&#039;s like having two secret passwords instead of one &#8211; double the protection! Regular communication and support through multiple channels keeps staff engaged and informed. Remember that <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">MFA enhances security<\/a> by requiring additional information beyond passwords, safeguarding sensitive information.<\/p>\n<p>Remember to start small with a <strong>test group<\/strong> (like picking team captains), then slowly add more players. Ask your team what they think and fix any problems they find.<\/p>\n<p>Keep the training going with fun <strong>refresher sessions<\/strong>, kind of like practicing your favorite sport to stay sharp!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Maintaining_and_Optimizing_Your_MFA_System\"><\/span>Maintaining and Optimizing Your MFA System<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that your team knows how to play the <strong>MFA game<\/strong>, let&#039;s keep it running smoothly &#8211; like making sure your bike stays shiny and the chain doesn&#039;t get rusty!<\/p>\n<p>I&#039;ll show you how to keep your MFA system working like a well-oiled machine. First, we&#039;ll check it regularly &#8211; just like you check your games for updates. Think of it as giving your MFA a <strong>health check-up<\/strong>!<\/p>\n<p>We&#039;ll look for any <strong>sneaky problems<\/strong> (I call them bugs) that might try to cause trouble. Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.adnovum.com\/blog\/optimise-your-mfa-implementation-with-these-8-key-practices\">automated scanning tools<\/a>, we can spot issues before they become big problems.<\/p>\n<p>Want to make it even better? I love <strong>collecting feedback<\/strong> from users &#8211; it&#039;s like getting tips from friends about the best way to play your favorite game.<\/p>\n<p>Plus, we&#039;ll make sure everything <strong>follows the rules<\/strong>, just like how you follow the rules when playing tag or basketball!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_My_Authentication_Device_During_Travel\"><\/span>What Happens if I Lose My Authentication Device During Travel?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry if you lose your authentication device while traveling! I&#039;ve got your back.<\/p>\n<p>First, use those <strong>backup codes<\/strong> you saved before your trip &#8211; they&#039;re like special keys to access your account.<\/p>\n<p>If you set up multiple ways to sign in, try using another device or method.<\/p>\n<p>You can also contact your account&#039;s <strong>support team<\/strong> for help getting back in safely.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_MFA_Be_Temporarily_Disabled_for_Specific_Users_or_Circumstances\"><\/span>Can MFA Be Temporarily Disabled for Specific Users or Circumstances?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can <strong>temporarily disable MFA<\/strong> in three main ways!<\/p>\n<p>Think of it like having a special &#034;pause button&#034; for security.<\/p>\n<p>First, I can turn off MFA using <strong>security defaults<\/strong> &#8211; it&#039;s like hitting pause for everyone at once.<\/p>\n<p>Second, I can use <strong>conditional access policies<\/strong> to exempt specific users, like picking certain players to sit out a game.<\/p>\n<p>Finally, I can disable per-user MFA, which only affects one person at a time.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Does_MFA_Work_When_Theres_No_Internet_Connection\"><\/span>How Does MFA Work When There&#039;s No Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you a cool secret about <strong>MFA<\/strong> when there&#039;s no internet!<\/p>\n<p>It&#039;s like having a <strong>special backup plan<\/strong>. When you&#039;re online, your computer saves some special codes or remembers your security key.<\/p>\n<p>Then, when the internet&#039;s down, you can still prove it&#039;s really you! Think of it like packing a lunch &#8211; you prepare it now to use it later.<\/p>\n<p>You can use these <strong>offline codes<\/strong> a few times before needing internet again.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Will_MFA_Slow_Down_Our_Emergency_Response_Times_During_System_Issues\"><\/span>Will MFA Slow Down Our Emergency Response Times During System Issues?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I know you&#039;re worried about <strong>MFA slowing things down<\/strong> during emergencies, but I&#039;ve got good news!<\/p>\n<p>With <strong>proper setup and practice<\/strong>, MFA won&#039;t cause delays. Think of it like a fire drill at school &#8211; when you practice it often, you know exactly what to do.<\/p>\n<p>I recommend using <strong>quick biometric options<\/strong> (like fingerprints) and training your team regularly. That way, everyone stays both safe and speedy!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_Implementing_MFA_Affect_Our_Existing_Software_Licensing_Agreements\"><\/span>Does Implementing MFA Affect Our Existing Software Licensing Agreements?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, <strong>MFA<\/strong> can affect your <strong>software licenses<\/strong>.<\/p>\n<p>I&#039;ll help you understand how! Think of it like upgrading your favorite video game &#8211; sometimes you need a special pass to get the cool new features.<\/p>\n<p>You might need to update some licenses to work with MFA, while others already include it.<\/p>\n<p>I recommend checking your <strong>current agreements<\/strong> and working with your vendors to understand what changes you&#039;ll need.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that you have the foundational steps to implement <strong>MFA<\/strong>, it&#039;s crucial to consider the next layer of security: <strong>password management<\/strong>. <strong>Strong passwords<\/strong> are the first line of defense against unauthorized access, but managing them effectively can be a challenge. This is where robust <strong>password security<\/strong> and passkey management come into play. By leveraging a reliable <strong>password manager<\/strong>, you can simplify the process of creating, storing, and managing your passwords securely.<\/p>\n<p>Take your security a step further by exploring solutions that offer comprehensive password management features. We encourage you to check out <strong>LogMeOnce<\/strong>, where you can sign up for a free account and start enhancing your organization&#039;s security today. With their intuitive platform, you&#039;ll ensure that your credentials are secure and easily accessible when you need them. Don&#039;t compromise on security&#x2014;visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and take control of your password management now!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Protect your digital assets with this step-by-step guide to implementing MFA, but are you making these common setup mistakes?<\/p>\n","protected":false},"author":5,"featured_media":243937,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[975,36357,36358],"class_list":["post-243938","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-digital-security","tag-mfa-implementation-2","tag-setup-mistakes"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243938","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=243938"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/243938\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/243937"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=243938"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=243938"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=243938"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}