{"id":244220,"date":"2025-02-05T16:30:37","date_gmt":"2025-02-05T16:30:37","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/"},"modified":"2025-02-05T16:30:37","modified_gmt":"2025-02-05T16:30:37","slug":"ransomware-protection-playbook","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/","title":{"rendered":"5 Essential Steps for Your Ransomware Protection Playbook"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of cybersecurity, the <strong>leaked password phenomenon<\/strong> has emerged as a critical concern for both individuals and organizations alike. Recently, a <strong>significant breach<\/strong> revealed a massive database of <strong>compromised passwords<\/strong>, making headlines across tech news platforms. These leaks often originate from various online platforms that fall victim to cyberattacks, exposing countless users to potential <strong>identity theft<\/strong> and unauthorized access to their accounts. The significance of these leaks cannot be overstated; they highlight the urgent need for <strong>stronger password practices<\/strong> and better security measures. For users, understanding the implications of these breaches is vital to safeguarding their digital identities and taking proactive steps to enhance their online safety.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Building_Your_Defense_Employee_Training_and_Awareness\" >Building Your Defense: Employee Training and Awareness<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Implementing_Strong_Technical_Safeguards\" >Implementing Strong Technical Safeguards<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Creating_an_Incident_Response_Strategy\" >Creating an Incident Response Strategy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Securing_Data_With_Strategic_Backup_Solutions\" >Securing Data With Strategic Backup Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Testing_and_Improving_Your_Protection_Plan\" >Testing and Improving Your Protection Plan<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#How_Do_We_Calculate_the_Total_Financial_Impact_of_a_Ransomware_Attack\" >How Do We Calculate the Total Financial Impact of a Ransomware Attack?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#Should_Organizations_Consider_Purchasing_Cyber_Insurance_Specifically_for_Ransomware_Protection\" >Should Organizations Consider Purchasing Cyber Insurance Specifically for Ransomware Protection?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#What_Legal_Obligations_Exist_for_Reporting_Ransomware_Attacks_to_Authorities\" >What Legal Obligations Exist for Reporting Ransomware Attacks to Authorities?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#When_Is_Paying_the_Ransom_Considered_a_Viable_Option\" >When Is Paying the Ransom Considered a Viable Option?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#How_Do_We_Maintain_Business_Operations_While_Systems_Are_Locked_During_Recovery\" >How Do We Maintain Business Operations While Systems Are Locked During Recovery?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/ransomware-protection-playbook\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Implement regular security awareness training for employees to recognize and avoid phishing attempts and ransomware threats.<\/li>\n<li>Deploy strong technical safeguards including firewalls, network segmentation, and AI-powered monitoring systems.<\/li>\n<li>Create comprehensive backups following the 3-2-1 rule with one copy kept offline and disconnected.<\/li>\n<li>Develop a detailed incident response plan with clear roles, procedures, and communication protocols.<\/li>\n<li>Regularly test security measures through simulated attacks and practice emergency response procedures.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Building_Your_Defense_Employee_Training_and_Awareness\"><\/span>Building Your Defense: Employee Training and Awareness<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When it comes to protecting your company from <strong>ransomware<\/strong>, your employees are like <strong>superheroes-in-training<\/strong>! Just like learning to ride a bike, they need regular practice to stay safe online.<\/p>\n<p>Did you know that employees who take <strong>fun security training<\/strong> are 30% less likely to fall for tricky email tricks? That&#039;s like having a special shield! Additionally, implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">multi-factor authentication<\/a> can significantly enhance your organization&#039;s security against unauthorized access.<\/p>\n<p>I&#039;ll help you create an awesome training program that your team will love. Think of it as teaching them to be <strong>cyber detectives<\/strong>! With <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.techtarget.com\/searchsecurity\/tip\/How-to-train-employees-to-avoid-ransomware\">human error causing<\/a> nearly three-quarters of breaches, effective training is essential.<\/p>\n<p>The best part? You can mix things up with cool activities. Try sending pretend <strong>phishing emails<\/strong> (like a game of spot-the-difference), show fun security videos, and create special training for different jobs.<\/p>\n<p>Remember to keep the training regular &#8211; just like brushing your teeth! With practice, your team will become ransomware-fighting champions.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Implementing_Strong_Technical_Safeguards\"><\/span>Implementing Strong Technical Safeguards<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that your team is ready to spot cyber tricks, let&#039;s build a <strong>super-strong fortress<\/strong> around your digital kingdom!<\/p>\n<p>Think of it like building the ultimate pillow fort &#8211; we&#039;ll use special walls called <strong>firewalls<\/strong> to keep the bad guys out.<\/p>\n<p>I&#039;ll help you set up <strong>clever traps<\/strong> (we call them honeypots) that trick hackers, just like setting up a fake cookie jar!<\/p>\n<p>We&#039;ll also make <strong>super-safe copies<\/strong> of your important stuff &#8211; imagine having a backup teddy bear in case your favorite one gets lost.<\/p>\n<p>We&#039;ll use <strong>smart computer helpers<\/strong> (like AI) to watch for anything suspicious, kind of like having a super-smart guard dog that never sleeps.<\/p>\n<p>And just like you update your favorite games, we&#039;ll keep all our computer tools up-to-date to stay one step ahead of the tricky ransomware monsters!<\/p>\n<p>Using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.isaca.org\/resources\/isaca-journal\/issues\/2020\/volume-4\/ransome-response-safeguards-and-countermeasures\">network segmentation<\/a>, we&#039;ll divide up your digital space like separate rooms in a house to keep your most valuable treasures extra safe.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Creating_an_Incident_Response_Strategy\"><\/span>Creating an Incident Response Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Getting ready for <strong>cyber-bullies<\/strong> is like preparing for a big game &#8211; you need a super-smart <strong>playbook<\/strong>!<\/p>\n<p>Just like you&#039;d have a plan for what to do if you fell off your bike, I&#039;ll help you create a plan for <strong>computer emergencies<\/strong>.<\/p>\n<p>First, we need to make a list of everything we want to protect &#8211; kind of like making an inventory of your favorite toys!<\/p>\n<p>Then, we&#039;ll set up special teams (like your <strong>superhero squad<\/strong>) who&#039;ll know exactly what to do if bad guys try to lock up our computers.<\/p>\n<p>You know how you practice fire drills at school? <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-cyber-security\/\">Multi-Factor Authentication<\/a> is an important part of our safety plan to ensure only authorized users can access sensitive information.<\/p>\n<p>We&#039;ll do the same thing with our <strong>computer safety plan<\/strong>!<\/p>\n<p>Having <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.exabeam.com\/explainers\/incident-response\/incident-response-for-ransomware-6-key-elements-and-critical-best-practices\/\">immutable backup solutions<\/a> will keep our important files safe even if bad guys try to mess with them.<\/p>\n<p>We&#039;ll practice, learn from our mistakes, and keep getting better &#8211; just like when you&#039;re learning to ride a bike.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Securing_Data_With_Strategic_Backup_Solutions\"><\/span>Securing Data With Strategic Backup Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like superheroes keep their special gadgets safe, I&#039;ll show you how to protect your computer stuff with awesome <strong>backup plans<\/strong>!<\/p>\n<p>Think of backups like making copies of your favorite toy &#8211; you&#039;d want extras in case something happens, right?<\/p>\n<p>I always follow what I call the &#034;3-2-1 rule&#034; &#8211; it&#039;s like having three scoops of different ice cream flavors! You&#039;ll need three copies of your <strong>important stuff<\/strong>, saved in two different ways (like on your computer and in the cloud &#8211; that&#039;s like a <strong>magical storage place<\/strong> in the sky!), and one copy kept far away from home. Implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/bypass-mfa\/\">multi-factor authentication<\/a> helps further secure your backups from unauthorized access.<\/p>\n<p>Here&#039;s a cool trick: keep one backup completely unplugged, just like when you hide your <strong>secret treasure map<\/strong>!<\/p>\n<p>This way, those mean computer bugs called <strong>ransomware<\/strong> can&#039;t touch it.<\/p>\n<p>Regular <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/objectfirst.com\/guides\/ransomware\/ransomware-backup-protection\/\">security awareness training<\/a> helps everyone in your family or school learn how to spot and avoid computer tricksters.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Testing_and_Improving_Your_Protection_Plan\"><\/span>Testing and Improving Your Protection Plan<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Having a <strong>super backup plan<\/strong> is great, but how can we be certain it really works? It&#039;s like testing a parachute before jumping &#8211; you want to make sure everything&#039;s perfect!<\/p>\n<p>I&#039;ll help you check your protection plan by playing a fun game called &#034;catch the bad guys.&#034; First, we&#039;ll pretend to be sneaky hackers (don&#039;t worry, we&#039;re the good guys!) and try to find <strong>weak spots<\/strong> in your computer&#039;s armor.<\/p>\n<p>Then, we&#039;ll test your <strong>backup system<\/strong> &#8211; it&#039;s like having an extra cookie saved for later, just in case you drop yours! With <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.qaoncloud.com\/blog\/rising-threat-of-ransomware-and-types-of-testing-for-ransomware-prevention\">493.33 million attacks<\/a> reported worldwide last year, having reliable backups is more critical than ever.<\/p>\n<p>We&#039;ll also practice what to do if trouble comes, just like fire drills at school.<\/p>\n<p>And guess what? We&#039;ll teach everyone in your team to spot <strong>tricky emails<\/strong>, kind of like finding Waldo in those picture books!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_We_Calculate_the_Total_Financial_Impact_of_a_Ransomware_Attack\"><\/span>How Do We Calculate the Total Financial Impact of a Ransomware Attack?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I calculate <strong>total ransomware costs<\/strong> by adding up everything that gets hurt when bad software locks up computers.<\/p>\n<p>First, I look at how long the business can&#039;t work (downtime) and multiply that by daily costs.<\/p>\n<p>Then I add the ransom payment, recovery expenses like fixing computers, and <strong>hidden costs<\/strong> like losing customers who get upset.<\/p>\n<p>It&#039;s like counting all the spilled milk, not just the broken glass!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Should_Organizations_Consider_Purchasing_Cyber_Insurance_Specifically_for_Ransomware_Protection\"><\/span>Should Organizations Consider Purchasing Cyber Insurance Specifically for Ransomware Protection?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I strongly recommend <strong>cyber insurance<\/strong> for <strong>ransomware protection<\/strong>.<\/p>\n<p>Think of it like a safety net when you&#039;re playing on the monkey bars &#8211; it&#039;s there to catch you if you fall!<\/p>\n<p>I&#039;ve seen how it helps businesses recover faster and protects their money if bad guys try to lock up their computers.<\/p>\n<p>It&#039;s just like having a <strong>superhero shield<\/strong> that covers costs for fixing damaged systems and getting help from cyber experts.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Legal_Obligations_Exist_for_Reporting_Ransomware_Attacks_to_Authorities\"><\/span>What Legal Obligations Exist for Reporting Ransomware Attacks to Authorities?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you about reporting <strong>ransomware attacks<\/strong> &#8211; it&#039;s like telling a teacher when something&#039;s wrong!<\/p>\n<p>If you&#039;re hit by ransomware, you must tell <strong>law enforcement<\/strong> quickly. Think of it as calling 911 for your computer!<\/p>\n<p>Different rules apply based on what kind of business you run. Healthcare companies must report fast, just like hospitals need to call for help right away.<\/p>\n<p>You&#039;ll also need to tell people whose <strong>data was affected<\/strong>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"When_Is_Paying_the_Ransom_Considered_a_Viable_Option\"><\/span>When Is Paying the Ransom Considered a Viable Option?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll be straight with you &#8211; <strong>paying a ransom<\/strong> is rarely a good choice!<\/p>\n<p>It&#039;s like giving your lunch money to a bully &#8211; they might just come back for more tomorrow.<\/p>\n<p>But if you&#039;re dealing with <strong>life-saving data<\/strong> (like at a hospital) and have <strong>no backups<\/strong>, it might be your only option.<\/p>\n<p>Remember though, there&#039;s no guarantee the bad guys will keep their promise even if you pay.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Do_We_Maintain_Business_Operations_While_Systems_Are_Locked_During_Recovery\"><\/span>How Do We Maintain Business Operations While Systems Are Locked During Recovery?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll help you keep your business running even when computers are locked up!<\/p>\n<p>First, switch to good old <strong>paper and pencils<\/strong> for important tasks &#8211; just like when the power goes out and you use flashlights.<\/p>\n<p>Use phones that still work to talk to customers.<\/p>\n<p>Have your team work from <strong>backup computers<\/strong> that aren&#039;t affected.<\/p>\n<p>Remember those <strong>emergency plans<\/strong> we practiced? Now&#039;s the time to use them!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While implementing the essential steps to safeguard your systems against <strong>ransomware<\/strong> is crucial, one often overlooked aspect is <strong>password security<\/strong>. Weak or reused passwords remain a significant vulnerability in any security strategy. To enhance your defenses, consider adopting <strong>robust password management<\/strong> and passkey management practices. This will help ensure that your credentials are not easily compromised.<\/p>\n<p>Take the proactive step of securing your online accounts by signing up for a <strong>Free account<\/strong> at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>. With their innovative solutions, you can manage your passwords effortlessly and keep your <strong>sensitive information<\/strong> safe from cyber threats. Don&#039;t wait for a <strong>security breach<\/strong> to take action; prioritize your password security today! By integrating these practices into your overall security strategy, you&#039;ll be better equipped to protect your data and maintain peace of mind. Stay secure and informed!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Just when you thought your data was secure, these crucial ransomware defense strategies reveal what cybercriminals don&#8217;t want you to know.<\/p>\n","protected":false},"author":5,"featured_media":244219,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[20638,1739,35911],"class_list":["post-244220","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-cyber-defense","tag-data-security","tag-ransomware-protection"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244220","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=244220"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/244220\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/244219"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=244220"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=244220"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=244220"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}