{"id":61398,"date":"2024-06-18T08:14:16","date_gmt":"2024-06-18T08:14:16","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/07\/31\/nist-password-recommendations\/"},"modified":"2024-06-29T11:34:39","modified_gmt":"2024-06-29T11:34:39","slug":"nist-password-recommendations","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/","title":{"rendered":"NIST Password Recommendations"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200bAre \u2062you using strong passwords to protect your online accounts? \u2063If not,\u200d it\u2019s time\u200b to start. \u2062The National Institute of Standards \u2063and Technology (NIST) has released a set of password recommendations\u200c to help \u200d<a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">users pick secure \u2063passwords<\/a>. These NIST password recommendations are a\u2062 must for\u2062 maintaining \u2063the\u2062 security \u2063of \u200dyour online accounts. With password \u2063breaches, hackers and data \u200cthieves \u2064constantly trying \u200cto break through, being proactive with your security is essential. \u2062By following the NIST password recommendations, users can set \u2063passwords that \u2064are secure and hard \u2062to guess.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#1_Securing_Your_Password_NIST_Top_Recommendations\" >1. Securing Your Password: NIST Top Recommendations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#2_Keeping%E2%80%8B_Your_Passwords_Safe_%E2%80%8Bfor_Good\" >2. Keeping\u200b Your Passwords Safe \u200bfor Good<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#3%E2%81%A2_Designing_a_%E2%80%8DSecure%E2%81%A2_Password_Strategy\" >3.\u2062 Designing a \u200dSecure\u2062 Password Strategy<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#4_Keys_to_Remember_About_Password_Best_Practices\" >4. Keys to Remember About Password Best Practices<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#Enhancing_Cybersecurity_through_Effective_Authentication_Practices_A_Comprehensive_Overview\" >Enhancing Cybersecurity through Effective Authentication Practices: A Comprehensive Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#Enhancing_Password_Security_Guidelines_for_Strong_and_Unique_Passwords\" >Enhancing Password Security: Guidelines for Strong and Unique Passwords<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#Q_A_NIST_Password_Recommendations\" >Q&amp;A: NIST Password Recommendations<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-securing-your-passwords-nists-top-recommendations\"><span class=\"ez-toc-section\" id=\"1_Securing_Your_Password_NIST_Top_Recommendations\"><\/span>1. Securing Your Password: NIST Top Recommendations<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It\u2019s essential \u2063to\u200d have secure passwords \u200din order to keep your data\u200c safe and\u2063 secure. That\u2019s why use of the latest NIST password recommendations \u2063is \u200cso\u2062 important. \u200bHere \u200bare\u200b the top tips from \u200cthe National Institute of Standards \u200band Technology \u2064that you need to know:<\/p>\n<ul>\n<li><b>Length: <\/b>Passwords should \u200cbe\u200b at \u2062least 8\u2064 characters in length. The longer it is, the stronger it\u2062 is.<\/li>\n<li><b>Complexity:<\/b> Your password should contain at least three\u200b of the following four\u200d characters: upper case letters, lower case \u200cletters,\u200b numerals, symbols or special characters.<\/li>\n<li><b>Unique:<\/b> Always use a \u2063unique\u200b password for each account\u2064 and website. Never use\u2064 the\u2064 same password for\u2062 different accounts.<\/li>\n<\/ul>\n<p>In addition to adhering to \u2062the NIST recommendations, you can further \u2064boost your security by using a password\u200c manager to keep all your passwords secure and safe. A password manager stores all \u2063your passwords in a secure\u200d vault \u200band\u2064 allows you to easily access them by using\u200c a single master password. \u2064The best part \u200cis that it\u2019s free to\u2062 use, \u2063so there\u2019s no reason not \u2064to give it a try and \u200bkeep \u200dyour \u200bdata safe!<\/p>\n<h2 id=\"2-keeping-your-passwords-safe-for-good\"><span class=\"ez-toc-section\" id=\"2_Keeping%E2%80%8B_Your_Passwords_Safe_%E2%80%8Bfor_Good\"><\/span>2. Keeping\u200b Your Passwords Safe \u200bfor Good<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Passwords\u2063 are \u200dan integral \u200bpart of keeping\u200c our accounts secure. But if one\u2063 password \u200bgets hacked, it \u2064has \u200bthe potential to cause serious damage. Therefore,\u2062 it is important to keep your passwords safe and secure. Here \u2063are some \u2063tips on how\u200b to do\u2062 that.<\/p>\n<ul>\n<li><strong>Create a Strong Password<\/strong> \u2013 Avoid using personal information, like your birthday or pet\u2019s\u200b name. Be\u200c creative and use a combination of \u200dwords and numbers. The longer the password,\u2063 the \u2063better.<\/li>\n<li><strong>Change \u2062your\u2064 Passwords Regularly<\/strong> \u2013 Making it a \u200bhabit \u2064to \u2062update\u2062 your passwords\u200b often can prevent them from being easily compromised. At least once a month is recommended.<\/li>\n<li><strong>Store your Passwords Safely<\/strong> \u2062\u2013 Keep\u200d a written record of\u200b all your\u200b passwords in a safe place, like a locked drawer at \u2063home or an encrypted file in your computer.\u200c Make sure you don\u2019t share\u200c this information with\u200b anyone.<\/li>\n<\/ul>\n<p>Using two-factor authentication can \u200dalso help protect your passwords. It adds\u200b an\u200c extra layer of security \u200cto your\u200d accounts, making it harder for unauthorized users \u200bto access them. \u200cTo maximize your security, make sure\u2064 to also \u200bcheck if any of your passwords have been leaked by \u200busing online services such \u200bas Have I Been Pwned.<\/p>\n<h2 id=\"3-designing-a-secure-password-strategy\"><span class=\"ez-toc-section\" id=\"3%E2%81%A2_Designing_a_%E2%80%8DSecure%E2%81%A2_Password_Strategy\"><\/span>3.\u2062 Designing a \u200dSecure\u2062 Password Strategy<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Creating Passwords that are Tough to Crack<\/b><\/p>\n<p>Passwords are the first line\u200c of defense for\u200b your online accounts. Crafting strong passwords \u2062that are hard to guess is critical to preventing unauthorized\u2062 access to \u2064your data. Here\u2019s \u200da few tips that can\u2064 help\u2064 you protect \u200dyour data:<\/p>\n<ul>\n<li>Create passwords that\u2064 are at least 8 characters long.<\/li>\n<li>Combine \u2064uppercase and\u200d lowercase \u2063letters, numbers \u200cand symbols (ex.A2#Bb3).<\/li>\n<li>Avoid personal information, like your birthdate or names of family members.<\/li>\n<li>Change \u200cyour passwords frequently.<\/li>\n<\/ul>\n<p>Using a password manager is an \u2062additional security measure \u200cthat\u200b can\u200d help\u200b manage and store your password for\u2062 all your accounts.\u2062 Password managers can also generate \u2064complex passwords that are difficult to \u200dcrack. The added\u2062 benefit with most password managers is that \u2064they are \u200boften \u2062cloud-based, meaning that you\u2064 can sync across \u200byour \u2063devices, such as a mobile \u2063phone, laptop or tablet.<\/p>\n<p>Don\u2019t become a victim! \u2062Stay \u200bone step ahead of cybercrime by establishing \u200ca\u2064 secure password strategy.<\/p>\n<h2 id=\"4-keys-to-remember-about-password-best-practices\"><span class=\"ez-toc-section\" id=\"4_Keys_to_Remember_About_Password_Best_Practices\"><\/span>4. Keys to Remember About Password Best Practices<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>No matter what type of \u200bsecurity measures you have \u2063in \u200bplace, you need\u2062 strong, \u200dsecure \u2063passwords to\u2063 protect\u200d your information online. \u200cHere are four key\u2064 points to\u200c remember when creating passwords or updating existing ones.<\/p>\n<p><b>Use Unique Passwords<\/b><\/p>\n<p>Using \u2063the\u2063 same password across multiple accounts is \u200brisky.\u2063 Make sure each of\u2063 your accounts has its own\u200d unique, hard-to-guess password. Combining\u200d uppercase and lowercase letters, numbers, and symbols \u2064makes a strong password.<\/p>\n<p><b>Make Passwords Long<\/b><\/p>\n<ul>\n<li>Nine to fifteen \u2064characters is \u2064an \u200bideal length. Shorter passwords are more easily guessed.<\/li>\n<li>Make use of the <a href=\"https:\/\/logmeonce.com\/schedule-login\/\">maximum character length\u2063 allowed<\/a>.<\/li>\n<\/ul>\n<p><b>Change Passwords Regularly<\/b><\/p>\n<p>Make sure\u2062 to change your passwords\u2062 frequently. Two to three\u200b times a\u2062 year is ideal, although you should change passwords for important accounts, \u2063such\u200d as\u200d banking and social networks,\u2064 more\u2062 often. Set reminders to\u2062 make sure you keep up with the\u200b schedule.<\/p>\n<p><b>Learn to Spot Suspicious Links<\/b><\/p>\n<p>Be cautious\u200d when clicking \u2064on <a title=\"Nist Password Recommendations\" href=\"https:\/\/logmeonce.com\/resources\/nist-password-recommendations\/\">e-mails \u2062links<\/a> and\u2063 websites\u2014stick to trusted sources.\u2062 If you\u2019re not sure if\u2062 something\u2019s legitimate or \u200dnot,\u200b open\u2062 a web browser and \u2064type in\u200b the URL manually. Also, watch \u2063for spelling\u2062 and grammar mistakes,\u200b which \u2062can be a sign\u200b of\u200b a malicious message.<\/p>\n<p><strong>Enhancing Password Security: Guidelines for Strong and Unique Passwords and Secure Authentication Practices<\/strong><\/p>\n<p>Password security is a critical aspect of safeguarding sensitive information and preventing unauthorized access to accounts and systems. Password guidelines recommend creating strong, unique passwords to protect against potential threats such as password databases and weaker passwords. A robust password policy is essential to establish standards for password strength and authentication processes, including the use of context-specific words and avoiding sequential characters.<\/p>\n<p>The gold standard for password security involves user-created passwords that meet technical requirements and are securely stored to prevent compromise. Additionally, authentication processes like knowledge-based authentication and federated identity play a crucial role in verifying subjects interacting with systems and digital services. It is important to assess privacy risks and implement appropriate security controls, as outlined in guidelines such as NIST SP 800-63-3, to mitigate additional risks and ensure successful authentication operations.<\/p>\n<p>Secure authentication methods, such as multi-factor authenticators and memory-hard functions, enhance user experience and protect against human error and social engineering attacks. A comprehensive approach to authentication, incorporating various authenticators and assurance levels, is key to effectively managing risk in digital environments.<\/p>\n<p>Sources:<br \/>\n&#8211; NIST Special Publication 800-63-3: Digital Identity Guidelines. National Institute of Standards and Technology. https:\/\/doi.org\/10.6028\/NIST.SP.800-63-3<br \/>\n&#8211; Circular A-130: Managing Information as a Strategic Resource. Office of Management and Budget. https:\/\/www.whitehouse.gov\/omb\/normative-control-hub\/<br \/>\n&#8211; &#8220;Authentication Methods.&#8221; Electronic Authentication Guideline. https:\/\/www.eauth.gov\/electronic-authentication-guideline\/authentication-methods\/<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Enhancing_Cybersecurity_through_Effective_Authentication_Practices_A_Comprehensive_Overview\"><\/span>Enhancing Cybersecurity through Effective Authentication Practices: A Comprehensive Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The authentication process is a crucial aspect of ensuring cybersecurity and protecting sensitive information. Password lists play a significant role in this process, as they help define the secure storage of user passwords and set password requirements for authentication attempts. Evidence of authenticator compromise poses a serious privacy risk, highlighting the importance of implementing distinct authentication factors and using verifier impersonation-resistant authentication protocols.<\/p>\n<p>The NIST SP 800-63-3 guidelines provide normative requirements for authentication protocols, including the use of multi-factor cryptographic devices and multi-factor OTP devices for increased security levels. Government agencies and federal systems often utilize federation protocols and Active Directory for authentication transactions, while also implementing biometric samples and identity proofing measures to verify users&#8217; identities.<\/p>\n<p>Physical devices, such as mobile devices and digital identity wallets, are used as alternate authenticators with different assurance levels to enhance the authentication process. Privacy risk assessments and <a href=\"https:\/\/doi.org\/10.17487\/RFC7525\" target=\"_blank\" rel=\"noopener nofollow\">risk management processes<\/a> are essential for evaluating and mitigating potential security threats in authentication sessions.<\/p>\n<p>Overall, implementing appropriately-tailored security controls and minimum assurance-related controls is crucial for protecting against authentication vulnerabilities and ensuring the integrity of digital identities. These facts are based on industry best practices and guidelines from reputable sources, such as the National Institute of Standards and Technology (NIST).<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Enhancing_Password_Security_Guidelines_for_Strong_and_Unique_Passwords\"><\/span>Enhancing Password Security: Guidelines for Strong and Unique Passwords<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<thead>\n<tr>\n<th>Password Recommendation<\/th>\n<th>Description<\/th>\n<\/tr>\n<\/thead>\n<tbody>\n<tr>\n<td>Length<\/td>\n<td>Passwords should be at least 8 characters long.<\/td>\n<\/tr>\n<tr>\n<td>Complexity<\/td>\n<td>Include at least three of the following: upper case letters, lower case letters, numerals, symbols or special characters.<\/td>\n<\/tr>\n<tr>\n<td>Unique<\/td>\n<td>Use a unique password for each account and website.<\/td>\n<\/tr>\n<tr>\n<td>Change Regularly<\/td>\n<td>Update passwords frequently, ideally two to three times a year.<\/td>\n<\/tr>\n<tr>\n<td>Secure Storage<\/td>\n<td>Use a password manager to securely store and manage passwords.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A_NIST_Password_Recommendations\"><\/span>Q&amp;A: <span style=\"font-size: 20px;\">NIST Password Recommendations<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q:\u2062 What \u200dare NIST password\u2062 recommendations? \u2063<br \/>\nA: NIST, \u200cthe National Institute \u2062of \u2063Standards\u200c and Technology,\u200c provides recommendations\u2062 on how to \u200dcreate secure passwords. These recommendations include making\u2062 your password long enough and \u200busing a combination of\u200b letters, \u200bnumbers, \u200band symbols.<\/p>\n<p>Q: What are some key guidelines for password security for Federal agencies?<br \/>\nA: Federal agencies must adhere to the guidelines outlined in the NIST Special Publication 800-63-3. This includes enforcing the use of multi-factor authentication, utilizing machine-generated passwords, and ensuring password complexity requirements are met.<\/p>\n<p>Q: How can Federal agencies protect against weak passwords and password-related attacks?<br \/>\nA: Federal agencies can prevent weak passwords by implementing password complexity requirements, enforcing password expiration policies, and <a href=\"http:\/\/csrc.nist.gov\/publications\/\" target=\"_blank\" rel=\"noopener nofollow\">storing password hashes securely<\/a>. Additionally, multi-factor authentication can help mitigate the risk of password-related attacks such as brute force attacks and phishing attempts.<\/p>\n<p>Q: What are some best practices for creating secure passwords according to the NIST guidelines?<br \/>\nA: The NIST guidelines recommend using lengthy passwords, avoiding common passwords, and incorporating a mix of characters including Unicode characters. User-generated passwords should meet the baseline of security controls and should not be easily guessable. Additionally, agencies should consider implementing multi-factor authentication for added security.<\/p>\n<p>Q: How important is it for Federal agencies to comply with the Digital Identity Guidelines?<br \/>\nA: Compliance with the Digital Identity Guidelines is crucial for Federal agencies to ensure the security of government systems and protect critical assets. By following these guidelines, agencies can reduce the risk of security breaches and unauthorized access to sensitive information.<\/p>\n<p>Q: What are some common security risks associated with password authentication?<br \/>\nA: Some common security risks associated with password authentication include offline attacks, brute force attacks, phishing attacks, and password database breaches. Weak passwords, password hints, and frequent password attempts can also pose security threats to authentication processes.<\/p>\n<p>Sources:<br \/>\n&#8211; NIST Special Publication 800-63-3: Digital Identity Guidelines<br \/>\n&#8211; &#8220;Best Practices for Password Security&#8221; by Cybersecurity and Infrastructure Security Agency (CISA)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In conclusion, strong passwords are essential for\u200c staying safe online.\u2062 NIST password\u2063 recommendations provide guidelines for \u2064choosing secure passwords. To help ensure your passwords\u2063 are secure, you could switch to a free \u200cLogMeOnce account. This will help\u2062 you adhere to the NIST \u2063standards for forming strong\u200b passwords and makes it\u2064 easier to manage \u2063and \u2063store your passwords without worrying about a breach.<\/p>\n<p>Opting for a\u2063 secure password storage and management service is an excellent way to keep your accounts\u200b secure, no matter \u2062the \u2062size of your <a href=\"https:\/\/logmeonce.com\/\" target=\"_blank\" rel=\"noopener\">LogMeOnce Password Manager<\/a>\u00a0\u200caccount\u2064 or business. Make \u200bsure\u2062 to follow the NIST\u200b password recommendation guidelines and \u200cprotect your \u2064online accounts with a secure\u200b password\u200c manager like LogMeOnce.\u2062 With it, \u200cyou\u200b can\u2064 create any number of\u2063 passwords for \u2063different\u2064 kinds\u200b of\u2064 accounts without having to memorize \u200dthem, all \u200dwhile adhering to strong password \u200bpolicies.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u200bAre \u2062you using strong passwords to protect your online accounts? \u2063If not,\u200d it\u2019s time\u200b to start. \u2062The National Institute of Standards \u2063and Technology (NIST) has released a set of password recommendations\u200c to help \u200dusers pick secure \u2063passwords. These NIST password recommendations are a\u2062 must for\u2062 maintaining \u2063the\u2062 security \u2063of \u200dyour online accounts. With password \u2063breaches, [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[89],"tags":[3765,6572,811,996,781],"class_list":["post-61398","post","type-post","status-publish","format-standard","hentry","category-password-manager","tag-data-protection-2","tag-nist","tag-online-safety","tag-passwords","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/61398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=61398"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/61398\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=61398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=61398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=61398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}