{"id":246820,"date":"2025-02-17T23:35:47","date_gmt":"2025-02-17T23:35:47","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/"},"modified":"2025-02-17T23:35:47","modified_gmt":"2025-02-17T23:35:47","slug":"security-for-social-networking","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/","title":{"rendered":"7 Essential Tips for Social Networking Security"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>In the ever-evolving landscape of cybersecurity, the issue of <strong>leaked passwords<\/strong> has come to the forefront as a significant threat to <strong>online safety<\/strong>. Recently, numerous high-profile <strong>data breaches<\/strong> have exposed millions of passwords, often appearing on dark web forums or in leaked databases available for hackers. This alarming trend highlights the vulnerability of user accounts and underscores the importance of strong password practices. For everyday users, understanding the implications of these leaks is crucial, as they can lead to <strong>unauthorized access<\/strong> to personal information, financial loss, and identity theft. Staying informed and proactive about <strong>password security<\/strong> is essential in safeguarding our digital lives.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Key_Highlights\" >Key Highlights<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Strong_Passwords_and_Two-Factor_Authentication\" >Strong Passwords and Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Privacy_Settings_and_Account_Controls\" >Privacy Settings and Account Controls<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Recognizing_and_Avoiding_Phishing_Scams\" >Recognizing and Avoiding Phishing Scams<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Location_Sharing_and_Geotagging_Safety\" >Location Sharing and Geotagging Safety<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Managing_Third-Party_App_Permissions\" >Managing Third-Party App Permissions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Safe_Photo_and_Content_Sharing_Practices\" >Safe Photo and Content Sharing Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Network_Connection_Security_Guidelines\" >Network Connection Security Guidelines<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Frequently_Asked_Questions\" >Frequently Asked Questions<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#How_Long_Should_I_Wait_Before_Accepting_a_Friend_Request\" >How Long Should I Wait Before Accepting a Friend Request?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#What_Should_I_Do_if_Someone_Creates_a_Fake_Profile_Impersonating_Me\" >What Should I Do if Someone Creates a Fake Profile Impersonating Me?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Can_Deleted_Social_Media_Posts_Still_Be_Found_Somewhere_Online\" >Can Deleted Social Media Posts Still Be Found Somewhere Online?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-13\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#Should_I_Create_Separate_Accounts_for_Personal_and_Professional_Networking\" >Should I Create Separate Accounts for Personal and Professional Networking?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-14\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#How_Often_Should_I_Update_My_Social_Media_Profile_Information\" >How Often Should I Update My Social Media Profile Information?<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-15\" href=\"https:\/\/logmeonce.com\/resources\/security-for-social-networking\/#The_Bottom_Line\" >The Bottom Line<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Key_Highlights\"><\/span>Key Highlights<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<ul>\n<li>Create complex passwords with letters, numbers, and symbols, and enable two-factor authentication for enhanced account protection.<\/li>\n<li>Review privacy settings monthly to control information sharing and maintain a curated list of trusted connections.<\/li>\n<li>Be vigilant against phishing scams by verifying sender identities and avoiding suspicious links or requests for personal information.<\/li>\n<li>Disable location sharing features when not needed and only share geographic information with trusted individuals.<\/li>\n<li>Monitor and limit third-party app permissions to prevent unauthorized access to personal data and social media accounts.<\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Strong_Passwords_and_Two-Factor_Authentication\"><\/span>Strong Passwords and Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>I want to talk to you about keeping your social media accounts <strong>super safe<\/strong> &#8211; it&#039;s like having a secret fort that only you can enter!<\/p>\n<p>Let&#039;s start with passwords. Think of a password as your <strong>special code<\/strong>, like the secret handshake you have with your best friend.<\/p>\n<p>You&#039;ll want to make your password <strong>really strong<\/strong> &#8211; mix up letters, numbers, and symbols. Instead of using &#034;dog,&#034; try &#034;D0g&#042;Treats!&#034;<\/p>\n<p>Have you ever used <strong>two-factor authentication<\/strong>? It&#039;s like having a double lock on your door! First, you enter your password, then you get a special code on your phone. It&#039;s that simple! Additionally, enabling <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/mfa-two-factor-authentication\/\">MFA (Multi-Factor Authentication)<\/a> ensures that even if someone gets your password, they can&#039;t access your account without the second form of verification.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Privacy_Settings_and_Account_Controls\"><\/span>Privacy Settings and Account Controls<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now let&#039;s explore the control room of your <strong>social media account<\/strong> &#8211; your <strong>privacy settings<\/strong>!<\/p>\n<p>Think of privacy settings like the doors and windows of your online treehouse. You get to decide who peeks inside! I&#039;ll show you how to be the boss of your account.<\/p>\n<p>Have you ever wondered who can see your posts and pictures? Let&#039;s make your account <strong>super-safe<\/strong> together!<\/p>\n<p>First, check who your friends are &#8211; just like picking teammates for dodgeball. Next, choose what you share &#8211; maybe your favorite ice cream flavor, but not your address!<\/p>\n<p>Finally, learn to <strong>block the bad guys<\/strong>, just like saying &#034;no thank you&#034; to strangers.<\/p>\n<p>Remember to check your settings every month, like brushing your teeth. It&#039;s that easy to <strong>stay safe online<\/strong>!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Recognizing_and_Avoiding_Phishing_Scams\"><\/span>Recognizing and Avoiding Phishing Scams<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>While your privacy settings keep your account safe like a fortress, sneaky scammers try to trick their way inside! They&#039;re like sneaky wolves wearing sheep costumes, sending messages that look real but aren&#039;t. I&#039;ll teach you their tricks so you can spot them right away!<\/p>\n<table>\n<thead>\n<tr>\n<th style=\"text-align: center\">Scam Type<\/th>\n<th style=\"text-align: center\">What It Looks Like<\/th>\n<th style=\"text-align: center\">How to Spot It<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td style=\"text-align: center\">Fake Friend<\/td>\n<td style=\"text-align: center\">&#034;Hi! Remember me?&#034;<\/td>\n<td style=\"text-align: center\">Check if you know them<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Prize Winner<\/td>\n<td style=\"text-align: center\">&#034;You won $1000!&#034;<\/td>\n<td style=\"text-align: center\">If it&#039;s too good to be true<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Password Reset<\/td>\n<td style=\"text-align: center\">&#034;Click here quick!&#034;<\/td>\n<td style=\"text-align: center\">Look at the email address<\/td>\n<\/tr>\n<tr>\n<td style=\"text-align: center\">Free Game<\/td>\n<td style=\"text-align: center\">&#034;Get Minecraft free!&#034;<\/td>\n<td style=\"text-align: center\">Real games aren&#039;t free<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Want to be a scam-spotting superhero? Look for weird spelling, strange links, or anyone asking for your password. Remember: real companies never ask for secret information in messages. If something feels fishy, show it to a grown-up!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Location_Sharing_and_Geotagging_Safety\"><\/span>Location Sharing and Geotagging Safety<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Do you know that your phone and apps can share your location with others?<\/p>\n<p>It&#039;s like telling everyone where you&#039;re playing hide-and-seek! While it&#039;s fun to share your adventures, we need to be careful about who knows where we are.<\/p>\n<p>Think of <strong>location sharing<\/strong> like a <strong>secret clubhouse<\/strong> &#8211; you only want your trusted friends to know where it is!<\/p>\n<p>Here&#039;s what you can do to <strong>stay safe<\/strong>:<\/p>\n<ol>\n<li>Turn off location services when you&#039;re not using them<\/li>\n<li>Never share your exact location on social media<\/li>\n<li>Check your privacy settings &#8211; make them as tight as your shoelaces!<\/li>\n<li>Only share location with parents or trusted grown-ups<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Managing_Third-Party_App_Permissions\"><\/span>Managing Third-Party App Permissions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Sometimes apps on your phone or tablet can be super sneaky &#8211; just like that friend who tries to peek at your cards during Go Fish! When you download a new app and connect it to your social media, it might ask for <strong>special permissions<\/strong> to see your photos, friends list, or even send messages.<\/p>\n<p>That&#039;s like giving someone the keys to your treehouse!<\/p>\n<ol>\n<li>Check your app permissions regularly &#8211; it&#039;s like doing a safety patrol of your backyard<\/li>\n<li>Remove permissions from apps you don&#039;t use anymore &#8211; just like cleaning out your toy box<\/li>\n<li>Only give apps the permissions they really need &#8211; if a coloring app asks to see your contacts, that&#039;s suspicious!<\/li>\n<\/ol>\n<p>You&#039;re the boss of your social media fort, so make sure you know which apps are allowed inside!<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Safe_Photo_and_Content_Sharing_Practices\"><\/span>Safe Photo and Content Sharing Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Have you ever shared a photo online that you later wished you hadn&#039;t? I know that feeling!<\/p>\n<p>Let&#039;s talk about being smart when <strong>sharing pictures<\/strong> and other fun stuff online.<\/p>\n<p>Before you post anything, ask yourself: &#034;Would I want my teacher or grandma to see this?&#034; That&#039;s a great way to decide!<\/p>\n<p>Here are my top <strong>safety tips<\/strong> for sharing:<\/p>\n<ol>\n<li>Never post your home address or phone number<\/li>\n<li>Check your background &#8211; are there any street signs or school names showing?<\/li>\n<li>Ask friends if it&#039;s okay before posting pictures of them<\/li>\n<li>Use privacy settings to control who sees your posts<\/li>\n<li>Think twice before sharing location tags<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Network_Connection_Security_Guidelines\"><\/span>Network Connection Security Guidelines<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Now that you&#039;re a pro at sharing photos safely, let&#039;s make sure no <strong>sneaky cyber-villains<\/strong> can peek at your online activities!<\/p>\n<p>Think of your internet connection like a <strong>secret clubhouse<\/strong> &#8211; you want to keep the door locked tight! Just like you wouldn&#039;t share your ice cream with strangers, you shouldn&#039;t let <strong>unknown networks<\/strong> access your social media.<\/p>\n<ol>\n<li>Only use Wi-Fi networks you trust, like at home or school. Public Wi-Fi at places like coffee shops can be tricky &#8211; it&#039;s like playing tag with someone you can&#039;t see!<\/li>\n<li>Always check for the little padlock symbol in your browser &#8211; it means your connection is safe and encrypted (that&#039;s a fancy word for &#034;super-secret&#034;).<\/li>\n<li>If you&#039;re using a phone app, make sure it&#039;s up-to-date, just like keeping fresh batteries in your favorite toy. Additionally, consider implementing <a target=\"_blank\" href=\"https:\/\/logmeonce.com\/resources\/importance-of-mfa\/\">multi-factor authentication<\/a> to add an extra layer of security to your accounts.<\/li>\n<\/ol>\n<h2><span class=\"ez-toc-section\" id=\"Frequently_Asked_Questions\"><\/span>Frequently Asked Questions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"How_Long_Should_I_Wait_Before_Accepting_a_Friend_Request\"><\/span>How Long Should I Wait Before Accepting a Friend Request?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I always wait at least a few days before accepting <strong>friend requests<\/strong>.<\/p>\n<p>It&#039;s like when you meet someone new at the playground &#8211; you don&#039;t instantly become best friends, right?<\/p>\n<p>First, I check if I <strong>know them<\/strong> in real life.<\/p>\n<p>Do we&#039;ve friends in common?<\/p>\n<p>Have I met them before?<\/p>\n<p>If I&#039;m not sure who they are, I don&#039;t accept their request.<\/p>\n<p>It&#039;s better to be <strong>safe than sorry<\/strong>!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"What_Should_I_Do_if_Someone_Creates_a_Fake_Profile_Impersonating_Me\"><\/span>What Should I Do if Someone Creates a Fake Profile Impersonating Me?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>If someone&#039;s pretending to be you online, don&#039;t panic!<\/p>\n<p>First, tell a <strong>trusted grown-up<\/strong> right away &#8211; they&#039;re like your superhero helpers.<\/p>\n<p>Next, <strong>report the fake profile<\/strong> to the social network (it&#039;s like telling a referee when someone&#039;s breaking the rules).<\/p>\n<p>Take screenshots of the fake profile as proof.<\/p>\n<p>Finally, let your friends know it&#039;s not really you &#8211; just like <strong>warning them<\/strong> about a copycat game at recess!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Can_Deleted_Social_Media_Posts_Still_Be_Found_Somewhere_Online\"><\/span>Can Deleted Social Media Posts Still Be Found Somewhere Online?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>You know how when you <strong>erase a drawing<\/strong>, tiny marks can still stay behind?<\/p>\n<p>It&#039;s similar with <strong>deleted social media posts<\/strong>! Even after you hit &#034;delete,&#034; your posts might still exist somewhere online. Screenshots, archives, and website backups can save copies.<\/p>\n<p>I always tell my friends to <strong>think carefully before posting<\/strong> anything &#8211; it&#039;s like putting toothpaste back in the tube, once it&#039;s out there, it&#039;s tricky to completely remove it!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Should_I_Create_Separate_Accounts_for_Personal_and_Professional_Networking\"><\/span>Should I Create Separate Accounts for Personal and Professional Networking?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Yes, I&#039;d definitely recommend creating <strong>separate accounts<\/strong>!<\/p>\n<p>Think of it like having two backpacks &#8211; one for school and one for fun.<\/p>\n<p>Your <strong>professional account<\/strong> is like your &#034;work clothes&#034; where you share job-related stuff and connect with colleagues.<\/p>\n<p>Your <strong>personal account<\/strong> is your &#034;play clothes&#034; where you can be more relaxed with friends and family.<\/p>\n<p>It&#039;s easier to manage and helps protect your privacy!<\/p>\n<h3><span class=\"ez-toc-section\" id=\"How_Often_Should_I_Update_My_Social_Media_Profile_Information\"><\/span>How Often Should I Update My Social Media Profile Information?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>I recommend updating your <strong>social media profile<\/strong> every 3-4 months or whenever something important changes in your life.<\/p>\n<p>Think of it like cleaning your room &#8211; you don&#039;t need to do it every day, but it&#039;s good to keep things fresh!<\/p>\n<p>Check if your <strong>contact info<\/strong>, <strong>job details<\/strong>, and profile picture are still right.<\/p>\n<p>Remember to remove old stuff you don&#039;t want others to see anymore.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"The_Bottom_Line\"><\/span>The Bottom Line<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As you navigate the exciting world of social networking, remember that your <strong>online safety<\/strong> extends beyond just the tips we&#039;ve shared. One of the most critical aspects of your digital security is <strong>password management<\/strong>. <strong>Strong, unique passwords<\/strong> act as the first line of defense against unauthorized access to your accounts. But managing multiple passwords can be overwhelming. That&#039;s where a reliable <strong>password manager<\/strong> comes in handy!<\/p>\n<p>With a password management solution, you can <strong>securely store<\/strong> all your passwords in one place, making it easier to access your accounts without compromising security. Plus, it allows you to generate strong passwords that are hard to crack. Don&#039;t leave your online safety to chance!<\/p>\n<p>Take proactive steps to protect your <strong>digital life<\/strong>. Sign up for a free account at <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> today and experience peace of mind knowing your passwords are secure and easily manageable.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Hack-proof your social media presence with these seven crucial security measures that could save you from digital disaster.<\/p>\n","protected":false},"author":5,"featured_media":246819,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[24718],"tags":[4237,6778,1143],"class_list":["post-246820","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-password","tag-digital-safety-2","tag-online-privacy","tag-social-media-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246820","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=246820"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/246820\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media\/246819"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=246820"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=246820"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=246820"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}