{"id":64952,"date":"2024-06-19T00:36:31","date_gmt":"2024-06-19T00:36:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/08\/what-is-two-factor-authentication-in-cyber-security\/"},"modified":"2024-08-19T13:08:45","modified_gmt":"2024-08-19T13:08:45","slug":"what-is-two-factor-authentication-in-cyber-security","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/","title":{"rendered":"What Is Two Factor Authentication In Cyber Security"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Two Factor Authentication (2FA) is a critical part of cyber security. It is one of the\u2062 most popular methods of authentication \u200dused by businesses \u200cand organizations worldwide, \u2062helping to protect sites \u2063from unauthorized access and data theft. It adds an\u200d extra layer of security to protect your online identity and personal data by \u2062requiring two distinct authentication methods.\u2062 When used together, these two types of authentication help to secure your identity \u2063by providing\u200d an additional layer of protection to\u200c your online accounts.\u2064 This article will explain what two factor authentication\u2063 in cyber \u2063security is\u200c and how it can \u2062help protect you\u200c from malicious actors online. By understanding how two factor authentication\u2062 works, organizations can ensure they are taking the most\u200d effective measures to\u2064 keep \u2064their data safe, and users can\u2064 remain \u200bsecure \u2064in the knowledge \u200dthat their information\u2062 is secure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#1_What_Is_Two-Factor_Authentication\" >1. What Is Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#2_How_Does_Two-Factor%E2%80%8D_Authentication_Help_Cyber_Security\" >2. How Does Two-Factor\u200d Authentication Help Cyber Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#3_What_Are%E2%80%8C_the%E2%80%8D_Different_Types_of_Two-Factor_Authentication\" >3. What Are\u200c the\u200d Different Types of Two-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#4_Making_Two-Factor_%E2%80%8CAuthentication_Part_of_Your_Cyber%E2%81%A3_Security_Plan\" >4. Making Two-Factor \u200cAuthentication Part of Your Cyber\u2063 Security Plan<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#Two-Factor_Authentication_for%E2%81%A4_Cyber_Security\" >Two-Factor Authentication for\u2064 Cyber Security<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#Benefits_of_Two-Factor_Authentication\" >Benefits of Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/logmeonce.com\/resources\/what-is-two-factor-authentication-in-cyber-security\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_Is_Two-Factor_Authentication\"><\/span>1. What Is Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor\u2064 authentication (2FA) is\u2064 an added security measure used when\u2064 logging into\u200d an account. 2FA requires you to \u2063use\u200b two different \u200ckinds of authentication\u2064 to gain access. It\u200d is sometimes called two-step authentication, dual-factor authentication or multi-factor authentication.<\/p>\n<p>2FA combines something the \u200duser knows, like a password, with something \u200cthey have, such \u200bas an app on their phone or a token, sent by email. \u200dThese two factors provide an \u2063additional layer that makes it \u2063harder for hackers to gain access to \u2064accounts or steal personal data. \u2064Some of the benefits of two-factor authentication include:<\/p>\n<ul>\n<li><b>Increased Security:<\/b> 2FA makes it more difficult for malicious actors to access accounts and personal data.<\/li>\n<li><b>More Confidence:<\/b> Two-factor\u200c authentication can give users peace of mind that their data\u200b is secure.<\/li>\n<li><b>Reduced Risk of Fraud:<\/b> \u2062 By requiring multiple \u2062methods of authentication, 2FA can help to prevent account \u200bhijacking\u200b and minimize the potential for identity theft.<\/li>\n<\/ul>\n<h2 id=\"2-how-does-two-factor-authentication-help-cyber-security\"><span class=\"ez-toc-section\" id=\"2_How_Does_Two-Factor%E2%80%8D_Authentication_Help_Cyber_Security\"><\/span>2. How Does Two-Factor\u200d Authentication Help Cyber Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two-Factor \u200bAuthentication<\/strong> is \u200dan additional layer of security that helps protect \u200bagainst\u2062 hackers and cyber criminals. Its purpose is to ensure that only\u200b the right\u200d person\u200c can access \u2062a user\u2019s online \u200caccounts or websites. With two-factor authentication, a user \u200dwill need to provide two sets of information to gain access. The \u200cfirst information \u2063is \u200busually\u2064 a username and password, which the user already knows. The second\u200d is\u2062 a physical or digital\u200c token, such \u200cas a code sent to\u200d the user\u2019s cell phone or a security key\u200d inserted into a\u200c USB port.<\/p>\n<p>Two-factor authentication adds an extra\u2063 layer of security and makes it more difficult for hackers \u2063to gain access to a \u200buser\u2019s sensitive information.\u2062 By adding a \u2064second form\u2062 of authentication, a\u200d hacker will need both the right username \u2064and password, as\u2062 well as the code from the user\u2019s physical \u2064or\u2064 digital token. This makes it impossible for hackers to access accounts\u200d unless they have both sets of credentials. Additionally, two-factor authentication\u200c requires the user to be physically present, which makes it nearly impossible for a remote hacker \u2062to gain access.<\/p>\n<p>With\u2064 two-factor authentication, users\u2063 can feel more secure in their online activities. Additionally, organizations can protect their data from \u200dcyber criminals more effectively.<\/p>\n<h2 id=\"3-what-are-the-different-types-of-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_What_Are%E2%80%8C_the%E2%80%8D_Different_Types_of_Two-Factor_Authentication\"><\/span>3. What Are\u200c the\u200d Different Types of Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Password and\u2064 Something Else<\/b><\/p>\n<p>Two-factor authentication (2FA) combines two \u200ddifferent components to verify your identity. The most common form of 2FA involves a password and something\u200d else. This\u200b \u201csomething else\u201d can include a security code sent to your email\u200b or text message, a \u200dcode from an authentication\u200b app, or\u2064 even biometric data such as a fingerprint or facial recognition. This is \u200bknown as knowledge-based and possession-based\u2062 authentication.<\/p>\n<p><b>Security Keys<\/b><\/p>\n<p>Another common\u200c type of 2FA is security keys, which\u2063 are a form of possession-based authentication. Security keys are physical USB \u200bdevices, such as a USB drive that you plug\u2063 into your laptop or\u200b PC. With \u200ca \u200dsecurity key, you can control the access to your accounts and data. You can also establish different control settings for various \u2063accounts. Security keys give you\u2064 an extra\u200c layer of security and are also used \u2063in \u2064applications that require sensitive data.<\/p>\n<h2 id=\"4-making-two-factor-authentication-part-of-your-cyber-security-plan\"><span class=\"ez-toc-section\" id=\"4_Making_Two-Factor_%E2%80%8CAuthentication_Part_of_Your_Cyber%E2%81%A3_Security_Plan\"><\/span>4. Making Two-Factor \u200cAuthentication Part of Your Cyber\u2063 Security Plan<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<h3><span class=\"ez-toc-section\" id=\"Two-Factor_Authentication_for%E2%81%A4_Cyber_Security\"><\/span>Two-Factor Authentication for\u2064 Cyber Security<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Two-Factor Authentication is\u200b an important tool all businesses should be using to protect their\u200b online security. It adds an additional layer of security\u200b by requiring two separate pieces of evidence before you can access your accounts, \u200cusually a password and one-time verification code. It\u2019s \u200deasy to set up, so let\u2019s\u2063 take \u200ca look at how to make Two-Factor\u2063 Authentication part of your cyber security.<\/p>\n<p><b>Steps for Implementing Two-Factor Authentication:<\/b><\/p>\n<ul>\n<li>Choose your \u200cauthentication method. This can be something like text\/SMS, email, push notifications, or a security code generator.<\/li>\n<li>Purchase the\u200c right hardware for your business. Depending on the type of authentication you \u200bchoose, you may need a card-reader or an authentication token.<\/li>\n<li>Set up the authentication \u200bon \u200dall of your \u2064accounts. User accounts, applications and \u200cpasswords \u2063should all be protected with two-factor \u2064authentication.<\/li>\n<li>Train your \u200busers. All of your users should be aware of Two-Factor Authentication and the\u200d process of \u2063using\u200c it when accessing their accounts.<\/li>\n<li>Regularly monitor \u2063the system. Make \u200dsure \u2064all of \u2064your accounts are up to date and the authentication process is working \u2064as \u2062expected.<\/li>\n<\/ul>\n<p>Two-Factor Authentication\u2062 is a great \u2063tool for protecting your online security.\u200d It\u2019s simple \u2064to set\u200c up and \u200bcan help \u2064protect your business against cyberattacks.\u200d Implementing Two-Factor Authentication is an important\u2062 part of any industry\u2019s cyber security plan, so \u200dmake \u2064sure you set it up\u200b today.\u200d<\/p>\n<p><strong>Strengthening Security with Multi-Factor Authentication: Protecting User Identities and Sensitive Information<\/strong><\/p>\n<p>Multi-factor authentication (MFA) is a critical security measure that helps protect user identities and sensitive information from cyber attacks and unauthorized access. It involves verifying a user&#8217;s identity using multiple forms of authentication such as something they know (like a password), something they have (like a physical token or mobile device), or something they are (like biometric data). MFA adds an extra layer of security to the authentication process by requiring users to provide two or more factors before gaining access to their accounts or systems. This helps mitigate security risks and prevents potential breaches that could occur with single-factor authentication methods.<\/p>\n<p>According to the National Institute of Standards and Technology (NIST), multi-factor authentication can significantly enhance security by reducing the likelihood of unauthorized access to systems and data. In their Digital Identity Guidelines, NIST recommends using MFA for all accounts that have access to sensitive information or systems. Additionally, industry experts like Duo Security and Cisco Secure Access advocate for the use of MFA as a standard security practice to protect against various attack methods such as brute-force attacks, man-in-the-middle attacks, and password database breaches.<\/p>\n<p>One common form of multi-factor authentication is two-step verification, which typically includes a combination of something the user knows (like a password) and something they have (like a one-time code sent to their mobile device). This additional step in the authentication process adds an extra layer of security by requiring users to verify their identity through multiple factors. Furthermore, adaptive authentication solutions use risk-based authentication to analyze various factors such as user behavior, location, and device type to determine the level of security needed for each authentication attempt.<\/p>\n<p>In today&#8217;s digital landscape where cyber actors and bad actors are constantly targeting personal and financial information, implementing multi-factor authentication is essential to strengthen security posture and protect against security breaches. It is crucial for individuals and organizations to prioritize the use of MFA to enhance their security defenses and mitigate the risk of unauthorized access and data breaches. By enabling multi-factor authentication for all accounts and systems, users can significantly reduce the likelihood of falling victim to cyber attacks and ensure a robust defense against external threats.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Two-Factor_Authentication\"><\/span>Benefits of Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Number<\/th>\n<th>Benefits<\/th>\n<\/tr>\n<tr>\n<td>1<\/td>\n<td>Increased Security<\/td>\n<\/tr>\n<tr>\n<td>2<\/td>\n<td>More Confidence<\/td>\n<\/tr>\n<tr>\n<td>3<\/td>\n<td>Reduced Risk of Fraud<\/td>\n<\/tr>\n<tr>\n<td>4<\/td>\n<td>Protection from Account Hijacking<\/td>\n<\/tr>\n<tr>\n<td>5<\/td>\n<td>Prevention of Identity Theft<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What \u200bis\u200b two-factor authentication in cyber\u2062 security?<\/p>\n<p>A: Two-factor \u2064authentication is an extra layer of security that requires two different ways of \u200dproving who \u2063you are. \u2064It\u2019s used to\u200c protect online \u2062accounts from unauthorized access. With\u200d two-factor authentication, the\u200d user must \u2063provide two pieces of \u200binformation- usually a password \u200dand \u2063a security code- to make sure only the right person\u200b can access their account. This \u200dmakes it harder for\u2062 hackers and other malicious attackers to gain access to your\u2062 account\u2063 and \u200dany sensitive data it might contain.<\/p>\n<p>Q: What is Multi-Factor Authentication (MFA)?<br \/>\nA: Multi-Factor Authentication (MFA) is a security process that requires more than one form of identification to verify a user&#8217;s identity before granting access to a system. This can include something the user knows (like a password), something the user has (like a security token), or something the user is (like a fingerprint scan).<\/p>\n<p>Q: Why is Multi-Factor Authentication important for security?<br \/>\nA: Multi-Factor Authentication adds an extra layer of security beyond just traditional passwords. By requiring multiple factors of authentication, MFA helps protect against various security threats such as phishing attacks, social engineering attacks, and unauthorized access attempts.<\/p>\n<p>Q: What are some common factors of authentication used in MFA?<br \/>\nA: Common factors of authentication used in Multi-Factor Authentication include something you know (like a password), something you have (like a security token), something you are (like a fingerprint scan), and somewhere you are (like your geographical location).<\/p>\n<p>Q: How does Multi-Factor Authentication enhance user authentication?<br \/>\nA: Multi-Factor Authentication enhances user authentication by requiring users to provide multiple forms of verification before accessing a system. This helps ensure that only legitimate users gain access and adds an extra layer of security to the authentication process.<\/p>\n<p>Q: What are some examples of Multi-Factor Authentication methods?<br \/>\nA: Some examples of Multi-Factor Authentication methods include using Authenticator apps, security tokens, fingerprint scans, one-time passcodes, and biometric identifiers to verify a user&#8217;s identity.<\/p>\n<p>Q: How can organizations implement Multi-Factor Authentication?<br \/>\nA: Organizations can implement Multi-Factor Authentication by integrating MFA solutions into their existing login systems, setting up additional authentication factors, and educating users on the importance of using MFA for enhanced security.<\/p>\n<p>Q: What are the benefits of using Multi-Factor Authentication?<br \/>\nA: The benefits of using Multi-Factor Authentication include increased security, protection against cyber threats, compliance with regulatory standards, and peace of mind for both organizations and users.<\/p>\n<p>Q: What is Multi-factor Authentication (MFA)?<br \/>\nA: Multi-factor authentication, also known as MFA, is a security process that requires multiple forms of identification to verify a user&#8217;s identity before granting access to a system or application. This can include a combination of factors such as something the user knows (like a password), something the user has (like a mobile phone or hardware token), or something the user is (like biometric data).<\/p>\n<p>Q: How does Multi-factor Authentication work?<br \/>\nA: Multi-factor authentication adds an extra layer of security to the login process by requiring users to provide multiple forms of identification. This could involve entering a password, receiving a one-time code on a mobile phone, or using biometric authentication like fingerprint or facial recognition. By using multiple factors, MFA helps to enhance security and protect against unauthorized access.<\/p>\n<p>Q: What are the benefits of Multi-factor Authentication?<br \/>\nA: Multi-factor authentication helps to increase security by making it more difficult for unauthorized users to access sensitive information. It adds an extra step to the authentication process, making it harder for attackers to gain access to accounts. By using multiple factors, MFA provides a more secure method of authentication compared to traditional password-only systems.<\/p>\n<p>Q: What are the different forms of identification used in Multi-factor Authentication?<br \/>\nA: Multi-factor authentication can include a variety of identification factors such as something the user knows (like a password or PIN code), something the user has (like a mobile phone or security token), or something the user is (like biometric data such as fingerprint or iris scanning). By using a combination of these factors, MFA helps to verify a user&#8217;s identity more securely.<\/p>\n<p>Q: How can organizations implement Multi-factor Authentication?<br \/>\nA: Organizations can implement multi-factor authentication by integrating MFA solutions into their existing access management systems. This may involve using authentication methods such as SMS codes, biometric authentication, hardware tokens, or mobile authenticator apps. By enforcing MFA, organizations can enhance security and better protect user accounts from unauthorized access.<\/p>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication, or 2FA as it is more \u2062commonly known, \u00a0\u200c<a href=\"https:\/\/logmeonce.com\/\" target=\"_blank\" rel=\"noopener\">LogMeOnce Password Manager<\/a>\u00a0is \u2062an \u200bimportant tool for keeping your data and personal information secure. \u200b provides \u2064free two-factor authentication for users looking for an <a href=\"https:\/\/logmeonce.com\/two-factor-authentication\/\">effective cyber security solution<\/a>. By creating a free LogMeOnce account, users can rest assured\u2062 that their online activity is \u200csecure and protected. Implementing 2FA is an indispensable \u2063step\u2062 to protect your data\u200c from \u200dcyber criminals, and with LogMeOnce\u2019s free two-factor authentication,\u2063 users will have peace of mind for their\u2064 online security.\u200b<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Two Factor Authentication (2FA) is a critical part of cyber security. It is one of the\u2062 most popular methods of authentication \u200dused by businesses \u200cand organizations worldwide, \u2062helping to protect sites \u2063from unauthorized access and data theft. It adds an\u200d extra layer of security to protect your online identity and personal data by \u2062requiring two [&hellip;]<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2006,1740,2071,980,1788],"class_list":["post-64952","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-protection","tag-cyber-security","tag-data-protection","tag-password-management","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/64952","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=64952"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/64952\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=64952"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=64952"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=64952"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}