{"id":244178,"date":"2025-02-04T22:24:18","date_gmt":"2025-02-04T22:24:18","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/"},"modified":"2025-02-04T22:24:18","modified_gmt":"2025-02-04T22:24:18","slug":"phish-resistant-mfa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/","title":{"rendered":"What Is Phish Resistant MFA and How Does It Work?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Phish-resistant MFA, or <strong>multi-factor authentication<\/strong>, is the ultimate safeguard for your digital life, akin to having a superhero&#039;s shield against cyber threats! This advanced security method has gained prominence as <strong>password leaks<\/strong> become more common, often appearing in notorious <strong>data breaches<\/strong> across various platforms. The significance of these leaks lies in their potential to expose sensitive information and compromise user accounts, making it crucial for individuals to adopt stronger security measures. <strong>Phish-resistant MFA<\/strong> enhances protection by requiring not just a password, but also physical devices or biometric verification, ensuring that even if a password is stolen, <strong>unauthorized access<\/strong> remains nearly impossible. In a world where <strong>cyberattacks<\/strong> are increasingly sophisticated, embracing phish-resistant MFA is essential for users who want to keep their online presence secure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Understanding_the_Core_Principles_of_Phishing-Resistant_MFA\" >Understanding the Core Principles of Phishing-Resistant MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Key_Technologies_Behind_Phishing-Resistant_Authentication\" >Key Technologies Behind Phishing-Resistant Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Comparing_Traditional_MFA_vs_Phishing-Resistant_Solutions\" >Comparing Traditional MFA vs. Phishing-Resistant Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Real-World_Applications_and_Implementation_Strategies\" >Real-World Applications and Implementation Strategies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Security_Benefits_and_Compliance_Requirements\" >Security Benefits and Compliance Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#What_Happens_if_I_Lose_My_Phishing-Resistant_MFA_Device\" >What Happens if I Lose My Phishing-Resistant MFA Device?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Can_Phishing-Resistant_MFA_Work_Without_an_Internet_Connection\" >Can Phishing-Resistant MFA Work Without an Internet Connection?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#How_Much_Does_Implementing_Phishing-Resistant_MFA_Typically_Cost\" >How Much Does Implementing Phishing-Resistant MFA Typically Cost?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Are_There_Any_Known_Vulnerabilities_or_Successful_Attacks_Against_Phishing-Resistant_MFA\" >Are There Any Known Vulnerabilities or Successful Attacks Against Phishing-Resistant MFA?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#Can_Multiple_Users_Share_the_Same_Phishing-Resistant_MFA_Device\" >Can Multiple Users Share the Same Phishing-Resistant MFA Device?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/phish-resistant-mfa\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Phishing-resistant MFA is an advanced authentication system that uses unique device-stored keys instead of traditional passwords for secure access.<\/li>\n<li>It combines multiple verification methods like biometrics, hardware tokens, and special security keys to ensure user identity.<\/li>\n<li>FIDO2 technology enables authentication through fingerprints or facial recognition, eliminating vulnerable password-based systems.<\/li>\n<li>The system creates unique identifiers for each login attempt, making it impossible for attackers to intercept or replicate credentials.<\/li>\n<li>Security keys, resembling USB devices, work alongside biometric verification to provide a robust, multi-layered authentication process.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_Core_Principles_of_Phishing-Resistant_MFA\"><\/span>Understanding the Core Principles of Phishing-Resistant MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>What Is Phish Resistant MFA and How Does It Work?<\/p>\n<p>Understanding the Core Principles of Phishing-Resistant MFA<\/p>\n<p>Think of <strong>phishing-resistant MFA<\/strong> like having a <strong>super-secret fortress<\/strong> that bad guys can&#039;t break into! You know how you need a special key to open your treasure box? Well, this is even cooler!<\/p>\n<p>Instead of sharing secret codes that could get stolen (like when someone peeks at your homework), phishing-resistant MFA uses special keys that only work for you. It&#039;s like having a <strong>magical fingerprint<\/strong> that no one else can copy! <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.paubox.com\/blog\/all-you-need-to-know-about-phishing-resistant-mfa\">Push notifications<\/a> on your phone help keep your information extra safe. This system combines <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/what-is-phishing-resistant-mfa\/\">multiple authentication steps<\/a> to enhance security.<\/p>\n<p>When you use it, you might tap your finger on a sensor or look at a camera &#8211; just like a spy movie!<\/p>\n<p>Want to know what makes it super safe? It uses something called <strong>hardware tokens<\/strong> &#8211; think of them as your very own <strong>superhero gadget<\/strong>!<\/p>\n<p>Plus, there are smart people checking to make sure everything stays secure, just like playground monitors keeping everyone safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Technologies_Behind_Phishing-Resistant_Authentication\"><\/span>Key Technologies Behind Phishing-Resistant Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s explore the <strong>super-cool technology<\/strong> that keeps your online world safe! Have you ever had a special key to your secret clubhouse? Well, that&#039;s kind of how FIDO works &#8211; it&#039;s like having a <strong>magic key<\/strong> that only YOU can use!<\/p>\n<p>Instead of sharing <strong>passwords<\/strong> (which sneaky hackers can steal), FIDO uses something called &#034;keys&#034; that live inside your device. One key stays hidden (like buried treasure), while the other helps prove it&#039;s really you. The technology requires <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.sans.org\/blog\/what-is-phishing-resistant-mfa\/\">multiple authentication factors<\/a> to keep your accounts extra secure. This is crucial for industries like <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/cisa-phishing-resistant-mfa\/\">healthcare and finance<\/a> as they protect sensitive information.<\/p>\n<p>It&#039;s super smart, like having a <strong>fingerprint scanner<\/strong> on your favorite game console!<\/p>\n<p>The best part? <strong>Big companies<\/strong> like Google, Apple, and Microsoft all use FIDO. It&#039;s like when all your friends agree to play by the same rules at recess &#8211; everyone works together to keep things safe and fun!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Comparing_Traditional_MFA_vs_Phishing-Resistant_Solutions\"><\/span>Comparing Traditional MFA vs. Phishing-Resistant Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Protecting your digital clubhouse from bad guys requires more than just a simple password these days!<\/p>\n<p>Think of <strong>traditional MFA<\/strong> like having a single lock on your treehouse &#8211; it helps, but clever thieves might still find a way in. The rise of <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.hypr.com\/what-is-phishing-resistant-mfa\">generative AI tools<\/a> has made phishing attacks even more dangerous.<\/p>\n<p>That&#039;s why I&#039;m excited to tell you about <strong>phishing-resistant MFA<\/strong>! It&#039;s like having a <strong>super-duper security system<\/strong> with <strong>fingerprint scanners<\/strong>, special keys, and secret codes all working together. This advanced system incorporates <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/phishing-resistant-mfa\/\">multiple verification methods<\/a> to ensure that your identity is safe.<\/p>\n<p>Instead of just using passwords that bad guys can steal (like when someone tries to peek at your lunch code!), this new system uses cool technology like <strong>biometrics<\/strong> &#8211; that&#039;s fancy talk for things unique to you, like your fingerprint!<\/p>\n<p>Have you ever used your finger to access a phone? That&#039;s similar to how it works!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Real-World_Applications_and_Implementation_Strategies\"><\/span>Real-World Applications and Implementation Strategies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to using <strong>phishing-resistant MFA<\/strong> in real life, it&#039;s like setting up your own <strong>superhero security system<\/strong>! You know how superheroes need special gadgets to keep their secret hideouts safe? Well, that&#039;s exactly what we&#039;re doing with our computers and phones! FIDO2 passkeys provide <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.securitymagazine.com\/blogs\/14-security-blog\/post\/101152-top-8-tips-for-implementing-mfa-effectively\">phishing-resistant authentication<\/a> through public key cryptography.<\/p>\n<p>I&#039;ll show you some cool ways to protect your accounts. First, you can use your <strong>fingerprint<\/strong> &#8211; just like a spy! Or maybe you&#039;d prefer a <strong>special security key<\/strong> that looks like a tiny USB stick.<\/p>\n<p>Some phones even let you use your face to access them &#8211; how neat is that?<\/p>\n<p>Remember to keep your security tools safe, just like you&#039;d protect your favorite toy.<\/p>\n<p>And guess what? Your computer will send you <strong>special messages<\/strong> asking, &#034;Is this really you?&#034; before letting anyone in!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Security_Benefits_and_Compliance_Requirements\"><\/span>Security Benefits and Compliance Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security benefits and rules come with <strong>phishing-resistant MFA<\/strong>, just like having a super-secret clubhouse password! You know how you keep your favorite toys safe in a special box? That&#039;s what phishing-resistant MFA does for important computer stuff!<\/p>\n<p>Think of it as a <strong>triple-lock system<\/strong> &#8211; it&#039;s way stronger than just having one password. It uses cool things like <strong>special security keys<\/strong> (kind of like a magic wand!) and fingerprint scanners. Unlike traditional MFA methods, phishing-resistant MFA is completely <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/rublon.com\/blog\/phishing-resistant-mfa-vs-standard-mfa\/\">immune to attacks<\/a> that trick users.<\/p>\n<p>Have you ever played &#034;Simon Says&#034;? Well, this is like that, but better &#8211; it won&#039;t fall for any tricks!<\/p>\n<p>The government loves it so much, they made special rules saying everyone needs to use it. It&#039;s like when your school has <strong>playground rules<\/strong> to keep everyone safe. Would you believe it <strong>stops bad guys<\/strong> better than any other security system?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_My_Phishing-Resistant_MFA_Device\"><\/span>What Happens if I Lose My Phishing-Resistant MFA Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If you lose your <strong>phishing-resistant MFA device<\/strong>, don&#039;t panic!<\/p>\n<p>I&#039;ll tell you what to do. First, <strong>call your IT team<\/strong> right away &#8211; they&#039;ll block the lost device so no one else can use it.<\/p>\n<p>Then, they&#039;ll give you a new device and help you set it up.<\/p>\n<p>Think of it like losing a house key &#8211; you&#039;ll need a new one to get back in safely!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Phishing-Resistant_MFA_Work_Without_an_Internet_Connection\"><\/span>Can Phishing-Resistant MFA Work Without an Internet Connection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that <strong>phishing-resistant MFA<\/strong> can work offline!<\/p>\n<p>Think of it like having a <strong>special key<\/strong> that works even without the internet. Your device (like a security key or phone) stores secret codes that it can use to prove it&#039;s really you.<\/p>\n<p>It&#039;s similar to how your calculator works without wifi &#8211; it has everything it needs built right in. Some systems even let you set up <strong>temporary codes<\/strong> before traveling offline.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Does_Implementing_Phishing-Resistant_MFA_Typically_Cost\"><\/span>How Much Does Implementing Phishing-Resistant MFA Typically Cost?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The cost of <strong>phishing-resistant MFA<\/strong> varies a lot, just like how different ice cream flavors have different prices!<\/p>\n<p>For <strong>small businesses<\/strong>, it might cost $20-50 per person for basic security keys. Bigger companies could spend $50,000-$200,000 for everything.<\/p>\n<p>That sounds like a lot, right? But think of it like a <strong>super-strong lock<\/strong> that protects your treasures &#8211; it&#039;s worth it to keep the bad guys out!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_There_Any_Known_Vulnerabilities_or_Successful_Attacks_Against_Phishing-Resistant_MFA\"><\/span>Are There Any Known Vulnerabilities or Successful Attacks Against Phishing-Resistant MFA?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Even <strong>super-strong MFA<\/strong> isn&#039;t perfect!<\/p>\n<p>While it&#039;s really tough to trick, bad guys can still try sneaky ways to get around it.<\/p>\n<p>Sometimes they use <strong>social engineering<\/strong> &#8211; that&#039;s like when someone pretends to be your friend to get your secrets.<\/p>\n<p>Or they might find tiny bugs in the security code.<\/p>\n<p>That&#039;s why it&#039;s important to keep updating and checking our <strong>security systems<\/strong>, just like we update our favorite games!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Multiple_Users_Share_the_Same_Phishing-Resistant_MFA_Device\"><\/span>Can Multiple Users Share the Same Phishing-Resistant MFA Device?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I need to tell you something important &#8211; you shouldn&#039;t share <strong>phishing-resistant MFA devices<\/strong>!<\/p>\n<p>It&#039;s like having your own <strong>special key<\/strong> to your treasure chest. Each device is made just for one person, with special secret codes inside.<\/p>\n<p>Think of it like your toothbrush &#8211; you wouldn&#039;t share that with others, right?<\/p>\n<p>Sharing the device could let <strong>bad guys<\/strong> sneak in, so everyone needs their own!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we embrace the advancements of <strong>phishing-resistant MFA technologies<\/strong> like FIDO2 and hardware security keys, it&#039;s also crucial to consider the foundation of our online security: <strong>password management<\/strong>. <strong>Strong passwords<\/strong> are vital, but remembering them can be a challenge. This is where effective <strong>password security and management tools<\/strong> come into play. By adopting a robust password management system, you can generate, store, and autofill strong passwords without the hassle.<\/p>\n<p>Now is the perfect time to take control of your <strong>online safety<\/strong>. I encourage you to check out <strong>LogMeOnce<\/strong>, which offers a comprehensive solution for password and passkey management. By signing up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, you can streamline your digital security and ensure that your credentials are protected against phishing attempts. Don&#039;t wait&#x2014;take action today to enhance your online security!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Outsmart cyber threats with phishing-resistant MFA &#8211; the innovative security solution that makes password theft virtually impossible.<\/p>\n","protected":false},"author":5,"featured_media":244177,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[35839,36436,26434],"class_list":["post-244178","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-mfa-security-2","tag-password-theft","tag-phishing-protection"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244178","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=244178"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244178\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/244177"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=244178"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=244178"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=244178"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}