{"id":245910,"date":"2025-02-14T19:19:35","date_gmt":"2025-02-14T19:19:35","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/"},"modified":"2025-02-14T19:19:35","modified_gmt":"2025-02-14T19:19:35","slug":"physical-penetration-testing","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/","title":{"rendered":"What Is Physical Penetration Testing and Why Matters?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Physical penetration testing is like a strategic game of &#034;capture the flag,&#034; but focused on securing buildings! This involves skilled <strong>security experts<\/strong> who are granted permission to infiltrate facilities and identify <strong>vulnerabilities<\/strong>, much like assessing a castle&#039;s defenses. They employ <strong>advanced tools<\/strong>, such as specialized cameras and even examine discarded documents for sensitive information. This practice is crucial for bolstering security measures against potential threats, ensuring that buildings remain safe from intruders. Let&#039;s delve into how these security professionals act as guardians, <strong>safeguarding our environments<\/strong> from risks.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Understanding_Physical_Penetration_Testing_Core_Components\" >Understanding Physical Penetration Testing: Core Components<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Key_Benefits_of_Physical_Security_Assessments\" >Key Benefits of Physical Security Assessments<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#The_Physical_Penetration_Testing_Process\" >The Physical Penetration Testing Process<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Essential_Tools_and_Techniques_in_Physical_Testing\" >Essential Tools and Techniques in Physical Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Best_Practices_for_Successful_Physical_Security_Testing\" >Best Practices for Successful Physical Security Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Real-World_Impact_and_Risk_Prevention\" >Real-World Impact and Risk Prevention<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#How_Much_Does_a_Typical_Physical_Penetration_Test_Cost\" >How Much Does a Typical Physical Penetration Test Cost?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Can_Physical_Penetration_Testing_Be_Conducted_Without_Employees_Knowing\" >Can Physical Penetration Testing Be Conducted Without Employees Knowing?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#What_Certifications_Are_Required_to_Become_a_Physical_Penetration_Tester\" >What Certifications Are Required to Become a Physical Penetration Tester?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#How_Long_Does_an_Average_Physical_Penetration_Test_Take\" >How Long Does an Average Physical Penetration Test Take?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#Are_Physical_Penetration_Testers_Legally_Protected_if_Caught_by_Law_Enforcement\" >Are Physical Penetration Testers Legally Protected if Caught by Law Enforcement?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/physical-penetration-testing\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Physical penetration testing simulates real-world attacks on buildings and facilities to identify security vulnerabilities before malicious actors can exploit them.<\/li>\n<li>It helps organizations protect valuable assets, ensure compliance with regulations, and validate the effectiveness of existing security measures.<\/li>\n<li>Testers use specialized tools, disguises, and surveillance techniques to attempt unauthorized access and expose weaknesses in physical security systems.<\/li>\n<li>The process requires proper planning, permission, and documentation to systematically evaluate entry points, access controls, and security protocols.<\/li>\n<li>Results from physical penetration testing enable organizations to implement targeted security improvements and prevent potential breaches before they occur.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Physical_Penetration_Testing_Core_Components\"><\/span>Understanding Physical Penetration Testing: Core Components<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you think about <strong>protecting something valuable<\/strong>, like your favorite toy or a secret clubhouse, you probably have special ways to keep it safe.<\/p>\n<p>Well, that&#039;s exactly what I do when I test how secure buildings are &#8211; it&#039;s like being a friendly spy!<\/p>\n<p>I use cool tools like <strong>special cameras<\/strong> and night-vision goggles to spot <strong>weak spots<\/strong>, just like you&#039;d look for holes in a fence.<\/p>\n<p>Sometimes I pretend to be someone else (like playing dress-up!) to see if I can get into places I shouldn&#039;t.<\/p>\n<p>I even check garbage cans for <strong>secret information<\/strong> &#8211; kinda gross, right?<\/p>\n<p>Think of it like testing a <strong>castle&#039;s defenses<\/strong>.<\/p>\n<p>I look for unauthorized ways to get in using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/purplesec.us\/learn\/physical-penetration-testing\/\">lock picking techniques<\/a>, just like trying different keys to unlock a door.<\/p>\n<p>I look at everything: doors, windows, and special rooms where important computers live.<\/p>\n<p>Have you ever played &#034;capture the flag&#034;? It&#039;s a lot like that!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Benefits_of_Physical_Security_Assessments\"><\/span>Key Benefits of Physical Security Assessments<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like having a superhero shield to protect you, <strong>physical security assessments<\/strong> help keep buildings and people extra safe!<\/p>\n<p>Think of it as giving your building a <strong>health check-up<\/strong>, just like when you visit the doctor.<\/p>\n<p>I&#039;ll tell you why these check-ups are so cool! They help <strong>spot sneaky problems<\/strong> before they become big troubles &#8211; like finding a hole in your favorite sock before it gets bigger.<\/p>\n<p>They also <strong>save money<\/strong> (kind of like your piggy bank) and make sure everyone follows safety rules. These assessments help organizations achieve <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.g3security.co.uk\/the-importance-of-physical-security-risk-assessment\/\">regulatory compliance<\/a> through detailed evaluations.<\/p>\n<p>You know how you feel safer when there&#039;s a grown-up watching you play? Well, security assessments do the same thing for buildings!<\/p>\n<p>They check cameras, doors, and special locks to make sure everything works perfectly.<\/p>\n<p>Isn&#039;t it amazing how we can <strong>protect places<\/strong> just like superheroes?<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Physical_Penetration_Testing_Process\"><\/span>The Physical Penetration Testing Process<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that we recognize why <strong>security check-ups<\/strong> are important, let&#039;s play detective and learn how they work!<\/p>\n<p>First, I plan my mission &#8211; just like preparing for a <strong>treasure hunt<\/strong>! I get permission (that&#039;s super important), make a map of where I&#039;ll look, and write down my <strong>detective rules<\/strong>.<\/p>\n<p>Then comes the fun part &#8211; I try to sneak in! Sometimes I pretend to be someone else (like wearing a delivery person&#039;s uniform), or I watch how people get into the building. The process typically takes <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/aressecuritycorp.com\/2024\/11\/01\/physical-penetration-testing\/\">1-2 weeks<\/a> to complete thoroughly.<\/p>\n<p>I look for <strong>accessible doors<\/strong>, forgotten passwords on sticky notes, or computers left turned on.<\/p>\n<p>I take lots of notes about what I find, just like a real detective.<\/p>\n<p>When I&#039;m done, I tell the company how to make their building safer &#8211; it&#039;s like giving them a <strong>safety recipe<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Essential_Tools_and_Techniques_in_Physical_Testing\"><\/span>Essential Tools and Techniques in Physical Testing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Three special groups of tools help me be a security detective!<\/p>\n<p>First, I&#039;ve got my <strong>lockpicking tools<\/strong> &#8211; they&#039;re like tiny keys that help me test if doors are secure. It&#039;s just like solving a puzzle!<\/p>\n<p>Next, I use my <strong>surveillance tools<\/strong>, which let me spot problems from far away. Have you ever used binoculars to watch birds? It&#039;s similar to that!<\/p>\n<p>The coolest tools are my <strong>access control testers<\/strong>. They help me check if buildings are keeping bad guys out. Think of them like a special flashlight that shows <strong>invisible security problems<\/strong>! <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.schellman.com\/blog\/penetration-testing\/physical-penetration-tests-overview\">Social engineering tactics<\/a> can make it easier for bad people to get inside buildings without permission.<\/p>\n<p>I also <strong>gather lots of information<\/strong> using maps and websites &#8211; just like doing research for a school project.<\/p>\n<p>What do you think these tools would find at your school? Remember, only security professionals can use these tools!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Successful_Physical_Security_Testing\"><\/span>Best Practices for Successful Physical Security Testing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Before testing <strong>physical security<\/strong>, I want to make sure you understand how I plan things out &#8211; it&#039;s like preparing for a big <strong>treasure hunt<\/strong>!<\/p>\n<p>Just like when you plan a birthday party, I need to get everything ready and make sure it&#039;s safe and fun. Think of me as a <strong>friendly security detective<\/strong> who helps keep buildings safe!<\/p>\n<p>Here are my top-secret detective rules:<\/p>\n<ol>\n<li>Always get permission first &#8211; just like asking your parents before going to a friend&#039;s house<\/li>\n<li>Make a careful plan &#8211; like drawing a map for your next adventure<\/li>\n<li>Test different ways to enter &#8211; similar to finding the best route to your favorite playground<\/li>\n<\/ol>\n<p>I use <strong>special tools and tricks<\/strong>, just like a magician! Would you believe I can test doors, windows, and even check if badges work properly?<\/p>\n<p>It&#039;s super important to <strong>protect places<\/strong>, just like you protect your special toy collection!<\/p>\n<p>Testing typically takes <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/butterflymx.com\/blog\/physical-penetration-testing\/\">one to three weeks<\/a> to thoroughly check every possible security weakness.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Real-World_Impact_and_Risk_Prevention\"><\/span>Real-World Impact and Risk Prevention<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When I test <strong>building security<\/strong>, it&#039;s like being a superhero who finds <strong>hidden problems<\/strong> before the bad guys do! I check if doors lock properly, look for sneaky ways someone could sneak in, and make sure <strong>security cameras<\/strong> are working &#8211; just like setting up the perfect hideout!<\/p>\n<p>You know how in hide-and-seek you try to find all the best hiding spots? That&#039;s what I do, but I also help fix those spots so no one can use them for real mischief.<\/p>\n<p>I teach people how to keep their buildings safe, like making sure they&#039;ve <strong>strong locks<\/strong> (way stronger than your piggy bank!) and helping guards know what to watch for. Many employees fall victim to <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.isaca.org\/resources\/white-papers\/2023\/physical-penetration-testing\">social engineering attacks<\/a> every year, so teaching them to spot tricks is super important.<\/p>\n<p>Want to know the coolest part? I get to help <strong>protect important places<\/strong> like hospitals and banks, just like a real-life superhero!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Much_Does_a_Typical_Physical_Penetration_Test_Cost\"><\/span>How Much Does a Typical Physical Penetration Test Cost?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what I know about <strong>physical penetration test costs<\/strong>! A <strong>basic test<\/strong> for one office usually costs around $4,800 and takes three days.<\/p>\n<p>It&#039;s like hiring a security superhero to check your building!<\/p>\n<p>But if you need to test more buildings or have <strong>special requirements<\/strong>, it can cost anywhere from $10,000 to $50,000.<\/p>\n<p>Travel costs are extra, like when I need a plane ticket to visit my grandma!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Physical_Penetration_Testing_Be_Conducted_Without_Employees_Knowing\"><\/span>Can Physical Penetration Testing Be Conducted Without Employees Knowing?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I can tell you that <strong>physical penetration testing<\/strong> can be done without employees knowing &#8211; it&#039;s called &#034;black box&#034; testing!<\/p>\n<p>I&#039;ve found this method really shows how <strong>secure a building<\/strong> truly is.<\/p>\n<p>Think of it like playing hide-and-seek, where the seeker doesn&#039;t tell anyone they&#039;re coming.<\/p>\n<p>It helps catch <strong>real security problems<\/strong> since employees act normally instead of being extra careful because they know they&#039;re being watched.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Certifications_Are_Required_to_Become_a_Physical_Penetration_Tester\"><\/span>What Certifications Are Required to Become a Physical Penetration Tester?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To become a physical penetration tester, I&#039;d recommend starting with the <strong>eJPT certification<\/strong> &#8211; it&#039;s like getting your first superhero badge!<\/p>\n<p>Then, you&#039;ll want to level up with either CEH or PenTest+.<\/p>\n<p>The big one is <strong>OSCP<\/strong>, which is pretty tough but super important.<\/p>\n<p>Don&#039;t forget about PSP and QNUK Level 4 &#8211; they&#039;re special certificates that focus on building your <strong>physical security skills<\/strong> and keeping everything legal and safe.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_an_Average_Physical_Penetration_Test_Take\"><\/span>How Long Does an Average Physical Penetration Test Take?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Based on my experience, most <strong>physical penetration tests<\/strong> take between 1-2 weeks, but I&#039;ve seen them last up to 6 weeks!<\/p>\n<p>Think of it like a <strong>big puzzle<\/strong> &#8211; the bigger the building, the longer it takes to solve.<\/p>\n<p>When I test a small office, it&#039;s quick like making a sandwich.<\/p>\n<p>But for huge companies with many buildings? That&#039;s more like cooking a whole <strong>Thanksgiving dinner<\/strong>!<\/p>\n<p>Want to guess what makes tests take longer?<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Are_Physical_Penetration_Testers_Legally_Protected_if_Caught_by_Law_Enforcement\"><\/span>Are Physical Penetration Testers Legally Protected if Caught by Law Enforcement?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I want to be clear &#8211; <strong>physical penetration testers<\/strong> aren&#039;t automatically protected if law enforcement catches them.<\/p>\n<p>Even with <strong>proper paperwork<\/strong>, they might still face temporary detention.<\/p>\n<p>That&#039;s why I always recommend carrying authorization documents, wearing company ID, and having <strong>emergency contacts<\/strong> ready.<\/p>\n<p>Like a get-out-of-jail card in Monopoly, proper documentation helps, but it&#039;s not a guaranteed shield against arrest.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we prioritize <strong>physical security<\/strong>, it&#039;s equally crucial to address the <strong>digital realm<\/strong> to safeguard our assets. Just like physical penetration testing identifies vulnerabilities in your building&#039;s security, <strong>robust password management<\/strong> is vital for protecting sensitive information. <strong>Weak passwords<\/strong> can serve as an open door for cybercriminals, making it essential to employ strong and unique passwords across all accounts.<\/p>\n<p>Consider adopting a reliable <strong>password management solution<\/strong> that can help you create, store, and manage your passwords securely. This is where <strong>LogMeOnce<\/strong> comes into play. By utilizing their innovative platform, you can ensure your passwords are strong and your accounts are protected. Don&#039;t wait for a breach to take action! Start your journey to better security today by signing up for a Free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>. Secure your digital castle just as diligently as you would your physical one!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Mysterious security experts legally break into buildings to expose vulnerabilities before real criminals can exploit them.<\/p>\n","protected":false},"author":5,"featured_media":245909,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[36169,12662,36770],"class_list":["post-245910","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-ethical-hacking-2","tag-penetration-testing","tag-security-vulnerabilities"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245910","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245910"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245910\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245909"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245910"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245910"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245910"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}