{"id":245990,"date":"2025-02-15T04:04:07","date_gmt":"2025-02-15T04:04:07","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/"},"modified":"2025-02-15T04:04:07","modified_gmt":"2025-02-15T04:04:07","slug":"penetration-testing-service","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/","title":{"rendered":"What Is a Penetration Testing Service?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Leaked passwords have become a pressing issue in the realm of <strong>cybersecurity<\/strong>, often surfacing in massive <strong>data breaches<\/strong> from popular online platforms or through dark web forums. These leaks can involve millions of compromised credentials, allowing <strong>malicious actors<\/strong> to gain unauthorized access to sensitive information and accounts. The significance of <strong>leaked passwords<\/strong> cannot be overstated; they pose a direct threat to users&#039; personal data, financial information, and overall <strong>digital security<\/strong>. For individuals and organizations alike, understanding the implications of these leaks is crucial for safeguarding their online presence and adopting proactive measures to protect against potential threats.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Understanding_Penetration_Testing_and_Its_Core_Functions\" >Understanding Penetration Testing and Its Core Functions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Key_Components_of_Professional_Penetration_Testing_Services\" >Key Components of Professional Penetration Testing Services<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#The_Business_Value_and_Benefits_of_Pen_Testing\" >The Business Value and Benefits of Pen Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#How_Penetration_Testing_Services_Protect_Your_Assets\" >How Penetration Testing Services Protect Your Assets<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Modern_Approaches_to_Security_Through_PTaaS\" >Modern Approaches to Security Through PTaaS<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Best_Practices_for_Implementing_Penetration_Testing\" >Best Practices for Implementing Penetration Testing<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#How_Long_Does_a_Typical_Penetration_Test_Take_to_Complete\" >How Long Does a Typical Penetration Test Take to Complete?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Can_Penetration_Testing_Accidentally_Damage_or_Disrupt_Our_Systems\" >Can Penetration Testing Accidentally Damage or Disrupt Our Systems?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#What_Certifications_Should_Penetration_Testers_Have\" >What Certifications Should Penetration Testers Have?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#How_Often_Should_Organizations_Conduct_Penetration_Tests\" >How Often Should Organizations Conduct Penetration Tests?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#Whats_the_Average_Cost_Range_for_Professional_Penetration_Testing_Services\" >What&#039;s the Average Cost Range for Professional Penetration Testing Services?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/penetration-testing-service\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>A professional service that identifies security vulnerabilities in computer systems through controlled hacking and testing procedures.<\/li>\n<li>Employs skilled security experts who use specialized tools to discover weaknesses before malicious hackers can exploit them.<\/li>\n<li>Follows a structured testing process, including system scanning, vulnerability assessment, and detailed reporting of findings.<\/li>\n<li>Provides businesses with actionable insights and recommendations to strengthen their cybersecurity defenses and protect assets.<\/li>\n<li>Functions as a proactive security measure by regularly checking systems and networks for potential security gaps.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Understanding_Penetration_Testing_and_Its_Core_Functions\"><\/span>Understanding Penetration Testing and Its Core Functions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When you want to keep something safe, like your favorite teddy bear or secret candy stash, you need to check for any sneaky ways someone could get to it. That&#039;s exactly what <strong>penetration testing<\/strong> does, but for computers and networks!<\/p>\n<p>I help companies find <strong>weak spots<\/strong> in their computer systems before the bad guys do. Think of me as a <strong>friendly detective<\/strong> who tries to break into places (with permission!) to show where security needs fixing.<\/p>\n<p>Have you ever played hide-and-seek? It&#039;s kind of like that! I look for all the <strong>hiding spots<\/strong> where trouble might lurk. By using <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.bluevoyant.com\/knowledge-center\/penetration-testing-complete-guide-to-process-types-and-tools\">specialized tools and techniques<\/a>, I can discover vulnerabilities that automated scans might miss entirely.<\/p>\n<p>Just like checking your backpack for holes before putting your lunch inside, I check computer systems using <strong>special tools and tricks<\/strong>. I test everything &#8211; from passwords to programs &#8211; to make sure the company&#039;s digital treasures stay safe!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Components_of_Professional_Penetration_Testing_Services\"><\/span>Key Components of Professional Penetration Testing Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Just like a treasure map has different parts that help you find the gold, <strong>professional penetration testing<\/strong> has special pieces that make it work!<\/p>\n<p>Think of me as your <strong>cyber detective guide<\/strong>, showing you all the cool tools we use to keep computers safe.<\/p>\n<p>I start by picking the right way to test &#8211; sometimes I go in knowing nothing (that&#039;s <strong>black box testing<\/strong>), or I might know everything (white box testing)!<\/p>\n<p>Then, I follow special steps, like a cooking recipe. First, I plan my mission, then I look for clues, scan for <strong>weak spots<\/strong>, and try to find ways in. It&#039;s like playing hide-and-seek with computer problems!<\/p>\n<p>I use awesome tools too &#8211; port scanners are like my magnifying glass, and <strong>password crackers<\/strong> help me spot weak passwords. Cool, right?<\/p>\n<p>After finding problems, I write up a detailed report with an <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/purplesec.us\/services\/penetration-testing\/\">Executive Summary<\/a> that tells you the most important things we discovered.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Business_Value_and_Benefits_of_Pen_Testing\"><\/span>The Business Value and Benefits of Pen Testing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Security is like a <strong>superhero shield<\/strong> for your business! You know how superheroes protect cities from bad guys? Well, that&#039;s what <strong>penetration testing<\/strong> does for companies! It&#039;s like having a friendly superhero check your fort for secret passages that sneaky villains might use.<\/p>\n<p>When I do penetration testing, I help businesses <strong>save money<\/strong> (like your piggy bank, but bigger!) and keep their reputation sparkly clean. Testing helps companies <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.schellman.com\/blog\/cybersecurity\/hidden-benefits-of-a-penetration-test\">identify new risks<\/a> that they never knew existed.<\/p>\n<p>Have you ever played &#034;spot the difference&#034; in puzzle books? That&#039;s kind of what I do &#8211; I <strong>spot problems<\/strong> before the bad guys can use them! It&#039;s super cool because it helps companies make their clients happy, avoid costly oopsies, and even get better insurance deals.<\/p>\n<p>Plus, just like practicing for a big game, <strong>regular testing<\/strong> makes everyone better at keeping the business safe!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_Penetration_Testing_Services_Protect_Your_Assets\"><\/span>How Penetration Testing Services Protect Your Assets<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Your <strong>digital treasures<\/strong> need a <strong>special kind of protection<\/strong>! Just like how you keep your favorite toys safe in a special box, I help protect your computer systems and data from bad guys who might try to break in. I use clever tools and tricks to find weak spots before the troublemakers do.<\/p>\n<p>Here&#039;s how I keep your digital stuff super safe:<\/p>\n<ol>\n<li>I act like a friendly detective, checking every corner of your systems to spot problems.<\/li>\n<li>I use special tools that work like a flashlight, shining light on hidden dangers.<\/li>\n<li>I write detailed reports that work like a treasure map, showing exactly what needs fixing.<\/li>\n<\/ol>\n<p>Think of me as your <strong>cyber guardian<\/strong> &#8211; I&#039;m always testing, checking, and making sure your digital world stays secure. Isn&#039;t it cool how we can outsmart the bad guys together? I follow strict <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Penetration_test\">NIST standards<\/a> to ensure your security meets the highest quality requirements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Modern_Approaches_to_Security_Through_PTaaS\"><\/span>Modern Approaches to Security Through PTaaS<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While traditional security testing happens once in a while, modern PTaaS (that&#039;s <strong>Penetration Testing as a Service<\/strong>) works like having a friendly robot guard watching your digital home <strong>24\/7<\/strong>!<\/p>\n<p>This approach helps companies save <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.pentestpeople.com\/blog-posts\/benefits-of-penetration-testing-as-a-service\">valuable resources<\/a> while staying safe year-round.<\/p>\n<p>It&#039;s super cool because it&#039;s always on the lookout for <strong>bad guys<\/strong> trying to sneak in.<\/p>\n<p>You know how your mom checks if you&#039;ve locked all the doors before bedtime? PTaaS does something similar but for computer systems!<\/p>\n<p>It uses smart tools that work together, just like how you and your friends team up in tag. If it spots anything suspicious, it quickly tells the <strong>security experts<\/strong> who can fix it right away.<\/p>\n<p>The best part? It&#039;s like having a <strong>guardian angel<\/strong> that never gets tired and keeps learning new tricks to protect your digital stuff better!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Best_Practices_for_Implementing_Penetration_Testing\"><\/span>Best Practices for Implementing Penetration Testing<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Implementing the best ways to test <strong>computer security<\/strong> is like being a detective on a super exciting mission!<\/p>\n<p>I&#039;m going to show you how to protect computers just like how you protect your favorite toys at home. Think of it as building an <strong>invisible shield<\/strong> around everything important!<\/p>\n<ol>\n<li>First, we make a special map (we call it an &#034;inventory&#034;) of all the computer stuff we need to protect &#8211; just like marking your favorite spots on a treasure map!<\/li>\n<li>Then, we look for any weak spots using special scanning tools &#8211; it&#039;s like playing &#034;I Spy&#034; but with computers!<\/li>\n<li>Finally, we write down everything we found and fix those weak spots &#8211; just like putting Band-Aids on scrapes to make them better.<\/li>\n<\/ol>\n<p>Have you ever played <strong>hide-and-seek<\/strong>? That&#039;s exactly what we&#039;re doing, but we&#039;re finding computer problems instead of people!<\/p>\n<p>Professional security experts called <a rel=\"nofollow noopener\" target=\"_blank\" href=\"https:\/\/www.nopsec.com\/resources\/whitepapers-ebooks\/penetration-test-best-practices\/\">ethical hackers<\/a> help companies find and fix problems before the bad guys can break in.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Does_a_Typical_Penetration_Test_Take_to_Complete\"><\/span>How Long Does a Typical Penetration Test Take to Complete?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Let me tell you about <strong>penetration tests<\/strong> &#8211; they&#039;re kind of like <strong>security check-ups<\/strong> for computers!<\/p>\n<p>Most of them take about <strong>2-4 weeks<\/strong> to finish, but some can be super quick (just 1 week) or really long (up to 15 weeks).<\/p>\n<p>It depends on how big and tricky the system is, just like how a tiny toy house is faster to explore than a huge castle!<\/p>\n<p>What do you think takes longer to check &#8211; your tablet or your school&#039;s computers?<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Penetration_Testing_Accidentally_Damage_or_Disrupt_Our_Systems\"><\/span>Can Penetration Testing Accidentally Damage or Disrupt Our Systems?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, <strong>penetration testing<\/strong> can sometimes disrupt systems, just like when you&#039;re building with blocks and accidentally knock them over.<\/p>\n<p>I&#039;ll help keep your systems safe by using special <strong>safety rules<\/strong>, like having <strong>backup plans<\/strong> and testing in safe spaces first.<\/p>\n<p>Think of it like practicing soccer in the backyard before playing in a real game &#8211; we&#039;re careful not to break anything while we learn and improve.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Certifications_Should_Penetration_Testers_Have\"><\/span>What Certifications Should Penetration Testers Have?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend looking for pen testers with CompTIA PenTest+ or CEH (Certified Ethical Hacker) certifications &#8211; they&#039;re like black belts in cyber ninja skills!<\/p>\n<p>For extra-secure projects, you&#039;ll want someone with GIAC or CISSP credentials too. They&#039;re like having a <strong>security guard<\/strong> who&#039;s also a computer genius!<\/p>\n<p>Think of certifications as badges that show they&#039;ve learned how to protect your <strong>digital fortress<\/strong>.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_Organizations_Conduct_Penetration_Tests\"><\/span>How Often Should Organizations Conduct Penetration Tests?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend testing at least once or twice a year as your <strong>basic safety check<\/strong>.<\/p>\n<p>Think of it like getting a checkup at the doctor!<\/p>\n<p>But if you&#039;re making <strong>big changes<\/strong> to your systems, you&#039;ll want to test more often.<\/p>\n<p>Some companies test every month, while others do it every three months.<\/p>\n<p>The key is to match your <strong>testing schedule<\/strong> to your organization&#039;s needs and risks.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Whats_the_Average_Cost_Range_for_Professional_Penetration_Testing_Services\"><\/span>What&#039;s the Average Cost Range for Professional Penetration Testing Services?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I&#039;ll tell you what professional penetration testing usually costs!<\/p>\n<p>For a basic test (we call it &#034;black box&#034;), you&#039;ll spend around $4,000 to $15,000.<\/p>\n<p>If you want a more detailed test (&#034;gray box&#034;), it&#039;s about $5,000 to $20,000.<\/p>\n<p>The super-thorough tests (&#034;white box&#034;) can cost between $10,000 and $30,000.<\/p>\n<p>Think of it like buying a car &#8211; you can get a basic model or one with all the fancy features!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As we dive into the importance of <strong>penetration testing<\/strong>, it&#039;s crucial to remember that securing your digital assets goes beyond just identifying <strong>vulnerabilities<\/strong>. One of the foundational aspects of cybersecurity is robust <strong>password management<\/strong>. <strong>Weak or reused passwords<\/strong> can create easy entry points for cybercriminals, even if you&#039;ve conducted thorough penetration tests.<\/p>\n<p>To bolster your defenses, consider implementing a reliable password management solution that helps you create, store, and manage strong, unique passwords for all your accounts. This is where <strong>LogMeOnce<\/strong> comes in. Their platform offers comprehensive <strong>password security<\/strong> and passkey management to keep your information safe from <strong>unauthorized access<\/strong>.<\/p>\n<p>Don&#039;t wait for a breach to take action. Take the first step towards securing your digital life by signing up for a free account today at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>. Protect your business and personal data with strong passwords and robust management tools!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Just like ethical hackers on a mission, penetration testing services hunt down security weaknesses before cybercriminals can exploit them.<\/p>\n","protected":false},"author":5,"featured_media":245989,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[35900,36169,12662],"class_list":["post-245990","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-two-factor-authentication","tag-cybersecurity-services","tag-ethical-hacking-2","tag-penetration-testing"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245990","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=245990"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/245990\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/245989"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=245990"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=245990"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=245990"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}