{"id":245492,"date":"2025-02-10T13:31:37","date_gmt":"2025-02-10T13:31:37","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/"},"modified":"2025-02-10T13:31:37","modified_gmt":"2025-02-10T13:31:37","slug":"you-must-use-multi-factor-authentication-to-access","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/","title":{"rendered":"What Steps Must You Take to Use Multi-Factor Authentication for Device Access?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In today&#039;s digital landscape, the significance of <strong>leaked passwords<\/strong> cannot be overstated, as they frequently serve as gateways for <strong>cybercriminals<\/strong> to infiltrate personal and corporate accounts. Recently, a prominent password leak surfaced on various underground forums, exposing millions of user credentials that had been compromised due to <strong>data breaches<\/strong>. This incident underscores the critical importance of <strong>robust cybersecurity measures<\/strong>, as the leaked passwords not only threaten individual users but also pose a broader risk to organizational security. With the rising frequency of such leaks, it&#039;s essential for users to understand the vulnerabilities they face and take proactive steps, such as implementing <strong>multi-factor authentication<\/strong>, to safeguard their digital identities.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Understanding_the_Core_Components_of_MFA\" >Understanding the Core Components of MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Setting_Up_Your_Primary_Authentication_Method\" >Setting Up Your Primary Authentication Method<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Enabling_Secondary_Verification_Factors\" >Enabling Secondary Verification Factors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Securing_Your_Recovery_Options\" >Securing Your Recovery Options<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Managing_Multiple_Devices_and_Access_Points\" >Managing Multiple Devices and Access Points<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#What_Happens_if_I_Lose_All_My_Authentication_Devices_Simultaneously\" >What Happens if I Lose All My Authentication Devices Simultaneously?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Can_I_Use_MFA_When_Traveling_Internationally_Without_Cellular_Service\" >Can I Use MFA When Traveling Internationally Without Cellular Service?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#How_Often_Should_I_Update_or_Rotate_My_Secondary_Authentication_Methods\" >How Often Should I Update or Rotate My Secondary Authentication Methods?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Does_Using_MFA_Significantly_Slow_Down_My_Login_Process_Time\" >Does Using MFA Significantly Slow Down My Login Process Time?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#Are_Some_MFA_Methods_More_Vulnerable_to_Social_Engineering_Attacks\" >Are Some MFA Methods More Vulnerable to Social Engineering Attacks?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/you-must-use-multi-factor-authentication-to-access\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Set up a primary authentication method like a password, Windows Hello, or Microsoft Authenticator app for initial access.<\/li>\n<li>Enable secondary verification factors such as SMS codes, fingerprint recognition, or security keys for additional protection.<\/li>\n<li>Store recovery codes securely in a physical location and create backup copies for emergency account access.<\/li>\n<li>Configure unique authentication settings for each device to maintain separate security layers.<\/li>\n<li>Keep all security features and authentication apps updated while using strong passwords for Wi-Fi connections.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_the_Core_Components_of_MFA\"><\/span>Understanding the Core Components of MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you think about keeping your favorite things safe, like a secret diary or special toy, you probably use a lock or hide them somewhere special. Well, that&#039;s exactly how multi-factor authentication (MFA) works for your devices!<\/p>\n<p>Just like how you might need both a key and a special knock to enter a secret clubhouse, MFA uses different ways to make sure it&#039;s really you.<\/p>\n<p>First, there&#039;s <strong>something you know<\/strong> &#8211; like a <strong>password or PIN<\/strong> (that&#039;s like a special code). Then, you&#039;ll use <strong>something you have<\/strong> &#8211; maybe your phone for a <strong>special message<\/strong>, or a cool security key that looks like a tiny USB stick. This approach combines <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/how-mfa-works\/\">knowledge and possession factors<\/a> to strengthen security.<\/p>\n<p>Some devices even check something about you, like your <strong>fingerprint or face<\/strong>! Isn&#039;t it amazing how many ways there are to keep your stuff super safe? This security approach helps stop <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/supertokens.com\/blog\/benefits-of-multi-factor-authentication\">99.9% of attacks<\/a> that try to break into accounts automatically.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Setting_Up_Your_Primary_Authentication_Method\"><\/span>Setting Up Your Primary Authentication Method<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like choosing your favorite superhero costume, picking your main way to access your device is super important! Your <strong>primary authentication<\/strong> (that&#039;s a fancy way of saying &#034;proving it&#039;s really you&#034;) needs to be strong and easy to use.<\/p>\n<p>Think of it as your <strong>secret handshake<\/strong> with your device! Microsoft recommends switching to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/learn.microsoft.com\/sr-cyrl-rs\/entra\/identity\/authentication\/concept-authentication-methods\">passwordless authentication methods<\/a> whenever possible. <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-setup-microsoft\/\">Multi-Factor Authentication<\/a> adds an extra layer of security to ensure your data stays protected.<\/p>\n<p>I&#039;ll show you some cool ways to <strong>protect your digital fort<\/strong>:<\/p>\n<ul>\n<li>Passwords &#8211; Like a special code word you make up<\/li>\n<li>Windows Hello &#8211; Uses your face or fingerprint, just like a spy movie!<\/li>\n<li>Microsoft Authenticator &#8211; A magical app that opens doors with a tap<\/li>\n<li>FIDO2 passkeys &#8211; Like having a special key that only works for you<\/li>\n<\/ul>\n<p>These methods are like different locks for your <strong>digital treasure chest<\/strong>. Some use numbers, others use your unique features, but they all keep the bad guys out!<\/p>\n<p>Which one do you think would work best for you?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Enabling_Secondary_Verification_Factors\"><\/span>Enabling Secondary Verification Factors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that you&#039;ve got your main password or <strong>special way to access<\/strong> your device, let&#039;s add another super-cool <strong>security layer<\/strong>!<\/p>\n<p>Think of it like having a special secret handshake after saying the password to your treehouse club.<\/p>\n<p>I&#039;ll help you pick the perfect <strong>second security step<\/strong>! You can use a <strong>tiny code<\/strong> that comes to your phone (like getting a secret message from a friend), or use your fingerprint (just like a spy!). <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/how-to-enable-mfa-office-365\/\">Multi-Factor Authentication<\/a> is designed to enhance security by requiring this extra verification step.<\/p>\n<p>Some people even have special USB keys &#8211; they&#039;re like magical keys that grant access to your computer.<\/p>\n<p>The code sent to your phone <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/support.microsoft.com\/en-us\/topic\/what-is-multifactor-authentication-e5e39437-121c-be60-d123-eda06bddf661\">changes every 30 seconds<\/a> to keep you extra safe.<\/p>\n<p>Want to try it? Go to your account settings &#8211; it&#039;s like opening your backpack to find your favorite snack.<\/p>\n<p>Look for &#034;Security&#034; or &#034;Two-Factor Authentication&#034; and click the magic button to turn it on.<\/p>\n<p>It&#039;s that easy to become a <strong>digital superhero<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Securing_Your_Recovery_Options\"><\/span>Securing Your Recovery Options<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Let&#039;s talk about keeping your <strong>special backup keys<\/strong> safe! Just like you&#039;d protect your favorite toy or secret clubhouse password, your <strong>recovery codes<\/strong> need a <strong>super-secure hiding spot<\/strong>.<\/p>\n<p>When you set up MFA (that&#039;s <strong>Multi-Factor Authentication<\/strong> &#8211; a fancy way to keep your devices extra safe), you&#039;ll get these special one-time-use codes. Having these codes is vital since they provide <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/blog.pixelfreestudio.com\/how-to-implement-multi-factor-authentication-for-web-security\/\">secure recovery options<\/a> if you lose access to your second authentication factor.<\/p>\n<p>Here&#039;s how to be a recovery code superhero:<\/p>\n<ul>\n<li>Write your codes down on paper and keep them in a secret spot<\/li>\n<li>Never share your codes with anyone &#8211; they&#039;re your special secret!<\/li>\n<li>Save a copy somewhere else safe, like with your parents<\/li>\n<li>Remember to get new codes after you use one, just like getting fresh cookies<\/li>\n<\/ul>\n<p>Think of these codes as your <strong>digital spare keys<\/strong> &#8211; they help you get back in when your regular keys aren&#039;t working!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Managing_Multiple_Devices_and_Access_Points\"><\/span>Managing Multiple Devices and Access Points<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you&#039;ve got lots of devices, like tablets, phones, and computers, keeping them all safe can feel like juggling cookies without dropping any!<\/p>\n<p>I&#039;ll show you how to protect all your cool gadgets with something special called <strong>MFA<\/strong> &#8211; it&#039;s like having a secret handshake for each device!<\/p>\n<p>First, we&#039;ll set up each device with its own <strong>special ID<\/strong>, just like how every superhero has their own unique power.<\/p>\n<p>Then, we&#039;ll add <strong>extra security layers<\/strong> &#8211; maybe your fingerprint (like a personal stamp), or a special code from an app.<\/p>\n<p>For your Wi-Fi access points (those little boxes that give you internet), we&#039;ll use <strong>super-strong passwords<\/strong> and the latest security updates.<\/p>\n<p>It&#039;s like building a fortress around your <strong>digital treasures<\/strong>!<\/p>\n<p>This comprehensive approach creates a <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/attractgroup.com\/blog\/the-importance-of-multi-factor-authentication\/\">layered defense system<\/a> that significantly reduces the risk of unauthorized access to your devices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"What_Happens_if_I_Lose_All_My_Authentication_Devices_Simultaneously\"><\/span>What Happens if I Lose All My Authentication Devices Simultaneously?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Don&#039;t worry! If you lose all your <strong>authentication devices<\/strong>, I&#039;ve got your back.<\/p>\n<p>First, use those <strong>backup codes<\/strong> you saved (they&#039;re like secret passwords).<\/p>\n<p>Can&#039;t find them? Contact <strong>customer support<\/strong> right away &#8211; they&#039;re like helpful superheroes! You&#039;ll need to prove who you are, just like showing your library card.<\/p>\n<p>Meanwhile, I recommend setting up new devices and keeping spare backup codes somewhere super safe.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_I_Use_MFA_When_Traveling_Internationally_Without_Cellular_Service\"><\/span>Can I Use MFA When Traveling Internationally Without Cellular Service?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can use <strong>MFA<\/strong> when traveling abroad without cell service!<\/p>\n<p>I&#039;ve found that <strong>authenticator apps<\/strong> like Google Authenticator work great offline. They&#039;re like a special password generator in my pocket. Before I travel, I make sure to set up these apps while I still have internet.<\/p>\n<p>I also bring a <strong>backup security key<\/strong> &#8211; it&#039;s like having a spare house key! Email-based MFA is another handy option.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_I_Update_or_Rotate_My_Secondary_Authentication_Methods\"><\/span>How Often Should I Update or Rotate My Secondary Authentication Methods?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend updating your <strong>secondary authentication methods<\/strong> every 3-6 months, just like changing your favorite game password!<\/p>\n<p>If you&#039;re using an <strong>authenticator app<\/strong>, I&#039;ll check it&#039;s working properly monthly.<\/p>\n<p>Don&#039;t forget to test your <strong>backup methods<\/strong> too &#8211; like your phone number or email.<\/p>\n<p>When traveling, I&#039;ll update them before I go.<\/p>\n<p>Think of it like checking your backpack before a big adventure!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Does_Using_MFA_Significantly_Slow_Down_My_Login_Process_Time\"><\/span>Does Using MFA Significantly Slow Down My Login Process Time?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>MFA doesn&#039;t slow you down much at all. I only need about 3 extra seconds to grab my phone and tap &#034;approve&#034; &#8211; that&#039;s shorter than tying my shoes!<\/p>\n<p>Think of it like having a <strong>special secret handshake<\/strong> with your best friend. The first login might take a tiny bit longer, but after that, it&#039;s <strong>super quick<\/strong>.<\/p>\n<p>Plus, <strong>many devices remember you<\/strong>, so you won&#039;t need to do it every time.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Some_MFA_Methods_More_Vulnerable_to_Social_Engineering_Attacks\"><\/span>Are Some MFA Methods More Vulnerable to Social Engineering Attacks?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, some <strong>MFA methods<\/strong> are easier for bad guys to trick!<\/p>\n<p>Think of <strong>SMS codes<\/strong> like leaving your lunch on a table &#8211; someone might grab it!<\/p>\n<p>That&#039;s why I&#039;d pick stronger options like special <strong>security keys<\/strong> (they&#039;re like a magic wand that only works for you!) or fingerprint scans.<\/p>\n<p>These are harder to copy or steal through sneaky tricks.<\/p>\n<p>I always avoid using phone calls or text messages for MFA when I can.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Setting up <strong>multi-factor authentication<\/strong> is just the beginning of your journey to enhanced digital security. Once you&#039;ve fortified your accounts, it&#039;s time to dive deeper into <strong>password security<\/strong>, management, and passkey management. With the increasing number of accounts we all juggle, maintaining strong, unique passwords for each can feel overwhelming. That&#039;s where having a reliable <strong>password manager<\/strong> comes in handy. It not only keeps your passwords secure but also simplifies the process of creating and managing them. If you want to take your security a step further, check out <strong>LogMeOnce<\/strong>. It offers a comprehensive solution for managing your passwords and passkeys effortlessly. You can get started with a <strong>free account<\/strong> today! Don&#039;t wait to boost your <strong>online security<\/strong> &#x2013; take control now and ensure your digital life remains safe and sound. Visit <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> and sign up for your free account!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Improve your device security today by discovering the essential steps for setting up multi-factor authentication that hackers can&#8217;t crack.<\/p>\n","protected":false},"author":5,"featured_media":245491,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[5545,12643,35827],"class_list":["post-245492","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-device-security","tag-hacker-prevention","tag-multi-factor-authentication-2"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245492"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245492\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245491"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}