{"id":68325,"date":"2024-06-19T18:17:52","date_gmt":"2024-06-19T18:17:52","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/two-factor-authentication-for-small-business\/"},"modified":"2024-07-10T16:51:10","modified_gmt":"2024-07-10T16:51:10","slug":"two-factor-authentication-for-small-business","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/","title":{"rendered":"Two Factor Authentication For Small Business"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Small\u200d business owners understand the value of keeping sensitive data and customer information secure. With Two Factor Authentication\u2064 For Small Business,\u200d business owners can ensure that their data is secure and safe from theft or \u2062exploitation. With two-factor authentication, small businesses are able to add an extra layer of security to their company\u2019s accounts to\u2062 protect \u200btheir data and\u200c customers from external forces. Two factor authentication is a must-have for small businesses, as it increases the security\u200b of their \u2064data, customers and business operations. With this technology in place, small businesses can rest assured knowing their data is safe and\u2064 secure.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#1_Keep%E2%80%8D_Your_Business_Secure_%E2%81%A4with_Two-Factor_Authentication\" >1. Keep\u200d Your Business Secure \u2064with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#2_The_Benefits_of_Two-Factor_Authentication_for_Small_Businesses\" >2. The Benefits of Two-Factor Authentication for Small Businesses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#3_Get_Started_with_Two-Factor_Authentication%E2%80%8B_Today\" >3. Get Started with Two-Factor Authentication\u200b Today<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#4_Dont_Delay_Keep_Your_Business_Safe_with_Two-Factor_Authentication\" >4. Don\u2019t Delay: Keep Your Business Safe with Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#Benefits_of_Two-Factor_Authentication_for_Small_Businesses\" >Benefits of Two-Factor Authentication for Small Businesses<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-keep-your-business-secure-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Keep%E2%80%8D_Your_Business_Secure_%E2%81%A4with_Two-Factor_Authentication\"><\/span>1. Keep\u200d Your Business Secure \u2064with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication is\u200c one of the essential security layers to\u200c protect any business. As \u200bthe name suggests, it\u2019s a two-step process that increases \u200dthe security for user\u200d accounts on your business\u2019 platform. Not\u200c only is two-factor authentication\u200d a great preventative measure, but it also makes it easier for customers to access \u200btheir accounts with peace of mind!<\/p>\n<p>Here are the steps you need to take to : \u200b<\/p>\n<ul>\n<li><strong>Set up authentication on all business accounts.<\/strong> Make sure that you enable two-factor authentication for\u200c every user account created on your platform. This will help reduce the chances for \u200ba successful hack or identity theft.<\/li>\n<li><strong>Send out notifications.<\/strong> Once two-factor authentication is set up, you should send out notifications to all users. To help ensure that users know\u200d the \u2063importance of \u2064setting up two-factor authentication, set up a training course to explain how to do it and its benefits.<\/li>\n<li><strong>Update regularly<\/strong>. Two-factor authentication should be updated regularly to ensure its effectiveness. This will help to make sure that any glitches in \u2064security can be fixed before they become major problems.<\/li>\n<\/ul>\n<p>By taking the\u200b steps outlined \u200dabove, you\u200d can make sure that your business is secure and customers don\u2019t have to worry about their accounts \u200bbeing\u200c compromised.<\/p>\n<h2 id=\"2-the-benefits-of-two-factor-authentication-for-small-businesses\"><span class=\"ez-toc-section\" id=\"2_The_Benefits_of_Two-Factor_Authentication_for_Small_Businesses\"><\/span>2. The Benefits of Two-Factor Authentication for Small Businesses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With the increasing prevalence of cybercrime, small businesses are becoming more vulnerable to malicious attacks. Fortunately, two-factor authentication (2FA) \u200bcan help protect small businesses from these electronic threats.<\/p>\n<p><b>1. Enhanced Security.<\/b> Using two-factor authentication requires logging in with two \u200cpieces of\u200b information: a password and a second authentication factor. This additional layer \u2063of <a href=\"https:\/\/logmeonce.com\/business-total-security\/\">protection helps thwart malicious attacks<\/a> and protects the company\u2019s\u200b confidential data. It serves as an additional safeguard if the password is ever compromised.<\/p>\n<p><b>2. Improved Compliance.<\/b> Noncompliance with regulations can result in hefty fines and penalties. 2FA can help\u200d small\u2063 businesses remain compliant\u200d as they are more secure than standard authentication methods. Furthermore, two<a title=\"Two Factor Authentication For Small Business\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-small-business\/\">-factor authentication helps protect sensitive customer data<\/a> such as credit card numbers and \u2063addresses, ensuring that customers\u2019 personal information \u200dremains safe.<\/p>\n<p><b>Other Benefits.<\/b><\/p>\n<ul>\n<li>Reduced risk of identity theft<\/li>\n<li>Reduced employee time\u200c spent on verification tasks<\/li>\n<li>Increased customer trust<\/li>\n<li>Decreased\u200b risk of \u2064cyber attacks and data\u2063 unauthorized access<\/li>\n<\/ul>\n<p>Two-factor authentication is a valuable tool for small businesses, as it helps protect confidential data, ensures data compliance and improves security overall.\u2062 With the \u2063threat of cybercrime on the rise, it is essential for small businesses to take steps to protect themselves and their customers.<\/p>\n<h2 id=\"3-get-started-with-two-factor-authentication-today\"><span class=\"ez-toc-section\" id=\"3_Get_Started_with_Two-Factor_Authentication%E2%80%8B_Today\"><\/span>3. Get Started with Two-Factor Authentication\u200b Today<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) is an essential security measure that helps protect your online accounts and data. By requiring \u2063an additional layer of verification, 2FA prevents unauthorized logins, even if someone knows your \u2064password. Here are the three simple steps to set \u2063up two-factor authentication for your accounts.<\/p>\n<ul>\n<li><b>Choose your authentication method.<\/b> \u2064 Your authentication method is the \u200cway you\u2019ll prove it\u2019s really you trying to log in. Popular\u200c 2FA methods include using codes from a mobile phone app, entering a code sent by text message, using \u2064physical security keys or biometric identification like fingerprints. \u200d<\/li>\n<li><b>Turn on 2FA on your accounts.<\/b> Log in to the account \u200dand look for the 2FA settings. Most online accounts or \u200dsoftware have an option to enable two-factor authentication. Set up the \u200caccount with your preferred authentication method.<\/li>\n<li><b>Store your backup code.<\/b> When you turn on 2FA, verify you have a secure backup option like a printed code or \u2064access to\u2063 a backup phone number. This ensures you won\u2019t get locked out of \u200byour account if you lose\u200c access to your authentication device.<\/li>\n<\/ul>\n<p>Once you complete these steps, two-factor authentication will\u2063 be enabled on your\u200b accounts. If \u200danything looks suspicious\u2062 with your\u200c logins, the additional verification layer will help protect your data. Start using two-factor authentication\u200c today and take \u200done more step to secure your online accounts!<\/p>\n<h2 id=\"4-dont-delay-keep-your-business-safe-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Dont_Delay_Keep_Your_Business_Safe_with_Two-Factor_Authentication\"><\/span>4. Don\u2019t Delay: Keep Your Business Safe with Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Protect Your Business\u2064 with Two-Factor\u2063 Authentication<\/strong><\/p>\n<p>Two-factor authentication \u2063is a security process that authenticates user identity using two different methods. This extra layer of security for businesses can help protect logins, emails, financial accounts,\u2062 and more from unwarranted access. Two-factor authentication is quick and easy to\u200d set up and can help keep business data secure.<\/p>\n<ul>\n<li>Use additional pieces of identity information. Two-factor authentication \u2063adds an\u2063 extra layer of security by requiring an additional piece of identity information like a code sent via text message or an app. Knowing who is trying to access sensitive business information\u200d is essential for keeping it secure.<\/li>\n<li>Stops unauthorized access. Unauthorized access\u200d can lead to stolen business data, which can have disastrous consequences. Two-factor authentication verifies the identity of the user trying to access business data and stops malicious attackers\u2063 before they can gain access.<\/li>\n<li>Eliminates the worry of forgotten\u200c passwords. It can be difficult\u200d to remember passwords for multiple accounts. Two-factor authentication simplifies this process, \u200cand ensures that only authorized \u2063users can \u2063access valuable\u200c information.<\/li>\n<\/ul>\n<p>It is \u2063critical for\u200c businesses to protect their data from outside threats, and two-factor authentication can make business information more secure. Don\u2019t delay in implementing two-factor authentication and keeping your business safe.<\/p>\n<p>In today&#8217;s digital age, small businesses are increasingly vulnerable to cyber attacks and security breaches. To mitigate these risks, many organizations are turning to Two Factor Authentication (2FA) as an additional layer of security. Multi-factor authentication methods, such as using a combination of traditional passwords and one-time codes sent to a cell phone, help to verify the identity of users and protect against bad actors. Security questions, verification codes, and biometric authentication are also common forms of 2FA.<\/p>\n<p>By implementing a multi-factor <a href=\"https:\/\/www.microsoft.com\/en-us\/security\/mobile-authenticator-app\" target=\"_blank\" rel=\"noopener nofollow\">authentication<\/a> solution, businesses can enhance security measures and prevent unauthorized access to sensitive resources. According to industry standards, two-step verification processes and additional authentication factors are essential components of a robust security strategy. Additionally, the use of factors such as possession (e.g. a mobile device) and knowledge (e.g. a password) further strengthens security protocols. Overall, implementing Two Factor Authentication is a crucial step for small businesses to safeguard against cybersecurity threats and protect their digital assets.<\/p>\n<p>In today&#8217;s digital age, the importance of cybersecurity measures cannot be overstated, especially for small businesses that may not have the resources or expertise to defend against cyber threats. One essential security measure that can significantly enhance the protection of sensitive data and assets is multi-factor authentication (MFA). This method adds an extra layer of security beyond the traditional password by requiring users to provide two or more forms of verification before gaining access to a system or application. This simple yet powerful security measure can help prevent unauthorized access, data breaches, and other cyber attacks.<\/p>\n<p>One of the most common forms of multi-factor authentication is the use of a one-time code sent to the user&#8217;s cell phone. This code is typically sent via SMS or generated by an authenticator app and must be entered along with the traditional password to complete the login process. By requiring this additional verification step, businesses can significantly reduce the risk of unauthorized access, even if a bad actor manages to obtain a user&#8217;s login credentials. Additionally, security questions can be used as an additional authentication factor, further bolstering the security of the login process.<\/p>\n<p>Another effective form of multi-factor authentication is the use of time-based one-time passwords (TOTP), which are generated by authenticator apps such as Google Authenticator. These one-time passwords are valid for only a short period of time, adding an extra layer of security to the login process. By implementing a multi-factor authentication solution that includes TOTP, businesses can effectively protect against phishing attacks and other online threats that target traditional passwords.<\/p>\n<p>Biometric authentication is another form of authentication that can be used as part of a multi-factor authentication solution. This form of authentication uses a person&#8217;s unique physical characteristics, such as fingerprints or facial features, to verify their identity. By incorporating biometric authentication into the login process, businesses can ensure proper identity verification and protect against unauthorized access. Additionally, biometric authentication provides a convenient and passwordless authentication method for users, enhancing the overall user experience while maintaining robust security measures.<\/p>\n<p>For businesses with remote employees or a modern workforce that relies on mobile devices for work, implementing multi-factor authentication is essential to secure access to sensitive company data and resources. Two-factor authentication methods can be tailored to accommodate remote work environments, providing additional security measures for employees working from various locations. By using mobile authenticators or authentication apps, businesses can ensure secure access to business systems and cloud storage, safeguarding sensitive resources from cyber threats.<\/p>\n<p>In conclusion, multi-factor authentication is an essential security measure for small businesses looking to enhance their digital security strategy and protect against cyber threats. By implementing a robust multi-factor authentication solution that includes a variety of authentication factors, businesses can establish a strong defense against unauthorized access and data breaches. From biometric authentication to time-based one-time passwords, there are various methods available to help businesses strengthen their security measures and safeguard their digital assets. By incorporating multi-factor authentication into their security practices, small businesses can effectively mitigate security challenges and ensure the protection of their sensitive information.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Two-Factor_Authentication_for_Small_Businesses\"><\/span>Benefits of Two-Factor Authentication for Small Businesses<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Using two factors to authenticate user identity, providing an additional layer of protection against malicious attacks and data breaches.<\/td>\n<\/tr>\n<tr>\n<td>Improved Compliance<\/td>\n<td>Helps small businesses remain compliant with regulations by ensuring enhanced security measures and protecting sensitive customer data.<\/td>\n<\/tr>\n<tr>\n<td>Other Benefits<\/td>\n<td>Includes reduced risk of identity theft, decreased risk of cyber attacks, increased customer trust, and decreased unauthorized access.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is multi-factor authentication (MFA) and why is it important for small businesses?<br \/>\nA: Multi-factor authentication (MFA) is a security process that requires users to provide two or more authentication factors to verify their identity before gaining access to a system or application. This can include something they know (like a traditional password), something they have (like their cell phone or a security token), or something they are (like biometric authentication). MFA is important for small businesses because it adds an extra layer of security beyond just a traditional password, making it harder for a bad actor to gain unauthorized access to sensitive data or systems.<\/p>\n<p>Q: What are some common types of authentication factors used in multi-factor authentication solutions?<br \/>\nA: Common authentication factors used in MFA solutions include one-time codes sent via SMS or email, time-based one-time passwords generated by an authenticator app, security questions, biometric verification (like fingerprint recognition), smart cards, and physical devices like security tokens. These additional authentication factors help to enhance the security of the login process and protect against phishing attacks and other online threats.<\/p>\n<p>Q: How does multi-factor authentication help to protect small businesses from security breaches?<br \/>\nA: Multi-factor authentication helps to protect small businesses from security breaches by adding an extra step to the login process, making it harder for hackers to access sensitive data or systems. By requiring users to verify their identity using multiple factors of authentication, MFA creates a more secure login process and can help prevent unauthorized access to business applications, cloud storage, and other digital resources.<\/p>\n<p>Q: What are some common challenges small businesses may face when implementing multi-factor authentication?<br \/>\nA: Some common challenges small businesses may face when implementing multi-factor authentication include balancing security measures with user experience, educating employees on the importance of MFA, managing and securing additional authentication factors, and ensuring compatibility with existing business systems and applications. It is important for small businesses to carefully consider these factors when choosing a multi-factor authentication solution to ensure effective protection against cyber breaches.<\/p>\n<p>Q: What are some best practices for small businesses to follow when implementing multi-factor authentication?<br \/>\nA: Some best practices for small businesses to follow when implementing multi-factor authentication include using a combination of authentication factors, regularly updating security settings and protocols, enforcing strong password practices, monitoring login attempts for any hack attempts, and providing ongoing training and support for employees. It is also important for small businesses to stay informed about industry standards and regulations related to digital security to ensure compliance and protection against security threats. (Source: Duo Security)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex-1 overflow-hidden\">\n<div class=\"h-full\">\n<div class=\"react-scroll-to-bottom--css-hvhgv-79elbk h-full\">\n<div class=\"react-scroll-to-bottom--css-hvhgv-1n7m0yu\">\n<div class=\"flex flex-col text-sm md:pb-9\">\n<div class=\"w-full text-token-text-primary\" dir=\"auto\" data-testid=\"conversation-turn-33\" data-scroll-anchor=\"true\">\n<div class=\"py-2 juice:py-[18px] px-3 text-base md:px-4 m-auto md:px-5 lg:px-1 xl:px-5\">\n<div class=\"mx-auto flex flex-1 gap-3 text-base juice:gap-4 juice:md:gap-5 juice:lg:gap-6 md:max-w-3xl lg:max-w-[40rem] xl:max-w-[48rem]\">\n<div class=\"group\/conversation-turn relative flex w-full min-w-0 flex-col agent-turn\">\n<div class=\"flex-col gap-1 md:gap-3\">\n<div class=\"flex flex-grow flex-col max-w-full\">\n<div class=\"min-h-[20px] text-message flex flex-col items-start whitespace-pre-wrap break-words [.text-message+&amp;]:mt-5 juice:w-full juice:items-end overflow-x-auto gap-3\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"e832d4c2-9e1d-4557-93b6-448295725978\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Two-factor authentication offers crucial security for small businesses, ensuring enhanced protection against cyber threats. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> offers a user-friendly and cost-effective solution to implement two-factor authentication seamlessly. With our service, small businesses can confidently defend against data breaches and online theft. Signing up is quick and free\u2014don&#8217;t delay in safeguarding your business with the robust security of two-factor authentication. Register for a free account today to shield your business from cyber crimes and data breaches effectively.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Discover the essential benefits of Two Factor Authentication for small businesses. Safeguard sensitive data with an extra layer of security. Need to set up? Consider a FREE LogMeOnce account for Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring\u2014ensuring robust security for your small business operations.<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3764,935,975,931,13470,1788],"class_list":["post-68325","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods-2","tag-cybersecurity","tag-digital-security","tag-online-security","tag-small-business","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68325","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68325"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68325\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68325"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68325"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68325"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}