{"id":68598,"date":"2024-06-19T20:17:31","date_gmt":"2024-06-19T20:17:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/two-factor-authentication-for-business\/"},"modified":"2024-06-19T20:17:31","modified_gmt":"2024-06-19T20:17:31","slug":"two-factor-authentication-for-business","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/","title":{"rendered":"Enhance Business Security with Two-factor Authentication: A Must for Safeguarding Your Data!"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Two-factor authentication for businesses is a powerful tool to keep essential business data safe.\u2064 By providing\u200d an \u2064extra layer of \u200dsecurity, businesses can protect their valuable information from hackers. It\u2062 is \u200da straightforward \u200cprocess that involves both physical and digital methods to verify user identity. With two-factor authentication, businesses can reduce the risk of unauthorized access and improve the\u200b security \u200bof their systems.\u2062 By integrating \u2064two-factor authentication into their systems,\u2063 companies can create a more secure\u200b environment\u2064 and \u200cincrease customer trust. As such, using \u2063two-factor authentication for businesses is a\u2063 great way to improve security\u200d and make\u2063 sure\u200d the most <a href=\"https:\/\/logmeonce.com\/two-factor-authentication\/\">sensitive data stays safe<\/a>.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#1_Keep_Your_Business_Secure_Introducing_Two-Factor%E2%80%8C_Authentication\" >1. Keep Your Business Secure: Introducing Two-Factor\u200c Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#2_Secure_Your_Business_with%E2%81%A3_Two-Factor_Authentication\" >2. Secure Your Business with\u2063 Two-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#3_How_%E2%80%8BDoes_Two-Factor_Authentication_Add_Extra_Security\" >3. How \u200bDoes Two-Factor Authentication Add Extra Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#4_Implementing_Two-Factor_Authentication_A%E2%80%8B_Step-by-Step_Guide\" >4. Implementing Two-Factor Authentication: A\u200b Step-by-Step Guide<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#Concepts_of_Authentication_and_Security_Measures\" >Concepts of Authentication and Security Measures<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-keep-your-business-secure-introducing-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Keep_Your_Business_Secure_Introducing_Two-Factor%E2%80%8C_Authentication\"><\/span>1. Keep Your Business Secure: Introducing Two-Factor\u200c Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>One of the most important aspects to consider when managing a business is\u2064 security. Two-factor authentication\u200b (2FA)\u200d is a great way to keep your business information safe.<\/b> By adding a second layer of\u200c authentication beyond \u200ba username and password, 2FA can provide an extra layer of security to protect your business from \u2062criminal \u2064hackers. Some common forms of two-factor authentication are:<\/p>\n<ul>\n<li>SMS-based authentication<\/li>\n<li>Biometric authentication<\/li>\n<li>YubiKey hardware tokens<\/li>\n<\/ul>\n<p>SMS-based authentication works by\u2063 sending a one-time\u2063 code \u2064to a mobile device associated with the account. The user\u200b must\u200d then enter the code in order to gain access to the\u200b account. Biometric authentication requires\u2063 users\u2062 to\u2064 verify their identity with biological identifiers such as fingerprints or facial scans.\u2064 YubiKey hardware tokens provide a physical key\u200d that\u2064 must be inserted into a USB port \u200din order to gain\u2062 access \u2062to the account.<\/p>\n<p>No\u200d matter which type of two-factor authentication\u2063 you choose, it is an effective\u200d way to protect your business from potential cybercriminal\u200b activity. It \u2062is important to ensure that only trusted users have access to sensitive information \u200bwithin your company. With two-factor authentication, you can rest easy knowing that your business is safe\u200d and secure.<\/p>\n<h2 id=\"2-secure-your-business-with-two-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_Secure_Your_Business_with%E2%81%A3_Two-Factor_Authentication\"><\/span>2. Secure Your Business with\u2063 Two-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As business\u200c owners, \u200csecurity \u200bis always at top of mind. One of the most important \u200csteps\u2064 for any business is\u2063 utilizing two-factor \u2064authentication\u2063 to secure its data and systems. Two-factor \u200bauthentication is an extra layer of security that can help protect \u200dyour business from malicious actors.\u200d<\/p>\n<ul>\n<li><b>Provides extra security:<\/b> Two-factor\u200b authentication combines\u200c two different components\u2014something \u200dyou\u2064 know, like a password, and something you have,\u200d like a smartphone\u2014to ensure that only authenticated users can have access to\u2063 your business\u2019s information. As an extra layer of security, two-factor authentication is a \u200dmuch-needed safeguard \u2064in the digital age.<\/li>\n<li><b>Prevents malicious actors from compromising data:<\/b> With\u200b two-factor authentication, even if someone were \u200bto gain access to a user\u2019s password,\u200b they \u200dwould \u200cstill need the second component of authentication \u2063to actually gain access to the business\u2019s data. This\u200d makes \u200dit much more difficult for malicious actors to gain access \u2063to your business and its data.<\/li>\n<li><b>Can\u2062 be used with any device:<\/b> Two-factor authentication\u200d can be used with any type of device, from smart phones to computers to tablets, and can be \u2062tailored to\u200d suit the needs\u2063 of your business.\u2064 For instance, you \u2064can opt for an authentication code that is sent to your device each time \u2064you or someone\u2062 else logs in, or\u2064 you could set up biometrics such as facial or fingerprint recognition.<\/li>\n<\/ul>\n<p>Two-factor authentication is an essential part\u2064 of keeping your business secure in\u200d the \u2063digital age. By \u200bsetting\u200d up two-factor \u200cauthentication, you \u2062can rest assured \u200bthat your \u2063business is safe from \u2064malicious actors and that only those who \u200bare authorized to \u200daccess your systems can gain entry.<\/p>\n<h2 id=\"3-how-does-two-factor-authentication-add-extra-security\"><span class=\"ez-toc-section\" id=\"3_How_%E2%80%8BDoes_Two-Factor_Authentication_Add_Extra_Security\"><\/span>3. How \u200bDoes Two-Factor Authentication Add Extra Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor authentication (2FA) \u2062is \u200dan added layer of security\u2062 used to verify \u200ca user\u2019s identity. By requiring a second form of identification, such as an answer to a security question or \u200ca \u2064code \u2064sent \u200bto your phone or\u2063 email, 2FA adds an extra\u200c barrier to protect you \u200dand your data from malicious actors. Here are \u200cthe key benefits of two-factor authentication:<\/p>\n<ul>\n<li><strong>Faster Identification:<\/strong> 2FA allows you to instantly verify your identity \u2062with just a few clicks. This makes financial \u200dtransactions and logins secure while\u2063 also\u2062 eliminating the need for \u200dlonger \u2064username and \u2064password combinations.<\/li>\n<li><strong>Enhanced Security:<\/strong> By adding a\u2063 second form of authentication,\u2063 you can\u2063 be sure that \u200dyour data and accounts \u200bare \u2062protected from unwanted access.<\/li>\n<li><strong>Heightened Privacy:<\/strong> Since 2FA relies on unique, one-time codes sent to the user\u2019s device or email, it \u2064creates an additional layer of privacy by <a title=\"Two Factor Authentication For Business\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-for-business\/\">making user data unreadable<\/a> \u2064to malicious actors.<\/li>\n<\/ul>\n<p>2FA is\u200b becoming increasingly popular among personal users and businesses alike\u2063 because of the extra level of security it \u2064provides. By requiring two forms of\u2064 authentication,\u200c 2FA\u2062 ensures that your data and accounts remain secure and\u2063 safe from cybercriminals.<\/p>\n<h2 id=\"4-implementing-two-factor-authentication-a-step-by-step-guide\"><span class=\"ez-toc-section\" id=\"4_Implementing_Two-Factor_Authentication_A%E2%80%8B_Step-by-Step_Guide\"><\/span>4. Implementing Two-Factor Authentication: A\u200b Step-by-Step Guide<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor\u2064 authentication (TFA)\u2064 is a\u2064 security measure used to secure access to online\u200d accounts. It requires users\u200b to provide two different authentication factors before they can access an account. This\u200d helps reduce the chances of password theft or misuse. In this step-by-step guide, you\u2019ll learn how to implement two-factor\u200c authentication on your online \u2064accounts.<\/p>\n<ul>\n<li><b>Set up a two-factor authentication system:<\/b> \u2063 First, you\u2062 will need to set up a two-factor authentication system for your online accounts. This can\u2062 be done\u200b either through existing services like \u2062Google Authenticator or Authy, or by using a specialized TFA software or service provider.<\/li>\n<li><b>Generate two-factor \u2063authentication code:<\/b> Next, \u200byou will need to\u2062 generate a code for each\u200d account you want to secure. You\u2064 can \u200cdo \u2064this by either setting\u2063 up two-factor authentication for\u2063 each\u200d account\u2062 separately or by using a specialized two-factor authentication\u2064 service.<\/li>\n<li><b>Input the code:<\/b> Once you have \u2063generated the codes, input them into the two-factor authentication system you \u2062have set up. This will \u2062require you to enter\u2063 the codes when you log\u2064 in to your account. \u200cSome \u2062systems may also require you to authenticate your identity by answering security\u2063 questions.<\/li>\n<li><b>Enable two-factor authentication for your account:<\/b> Finally, enable two-factor\u2063 authentication for your\u2063 account to allow it to securely\u200c access \u200byour online account. This can be\u200c done by going to the \u2063security settings on your account page \u2062and activating the two-factor authentication.<\/li>\n<\/ul>\n<p>Following these steps will help you securely set up two-factor authentication for your online accounts. Be sure to\u200b always keep \u2062your passwords and \u200bauthentication factors \u200dsecure to prevent any unauthorized\u2063 access to your accounts.<\/p>\n<p>Two-factor authentication for business is a critical aspect of ensuring the security of user accounts and data. Multi-factor authentication, which typically involves the use of two or more authentication factors such as passwords, biometric identifiers, or authentication tokens, adds an additional layer of security beyond just a username and password. This helps to protect against unauthorized access to email accounts, corporate accounts, and online services. Two-step verification, also known as 2-step verification, is a common form of multi-factor authentication that requires users to verify their identity through a second verification step, such as entering a code sent to their cell phone or email address. This method helps to prevent takeover attacks and unauthorized access to applications.<\/p>\n<p>Adaptive authentication solutions, which use real-time risk scores and artificial intelligence to analyze user behavior and detect suspicious activity, are becoming increasingly popular in the business world. Enterprise multi-factor authentication solutions offer a variety of authentication methods, including email token authentication and SMS token authentication, to verify user identities and protect against password brute force attacks and credential theft. In addition, compliance requirements from government agencies and Educational institutions are prompting businesses to implement stronger authentication methods, such as behavioral biometrics and iris scanning, to ensure proper identity verification. Overall, implementing two-factor authentication for business is crucial for protecting sensitive data and preventing unauthorized access to company resources. (<a href=\"https:\/\/enterprise.verizon.com\/resources\/reports\/2020-data-breach-investigations-report.pdf\" target=\"_blank\" rel=\"noopener nofollow\">source<\/a>: TechTarget, CIO)<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Concepts_of_Authentication_and_Security_Measures\"><\/span>Concepts of Authentication and Security Measures<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Concept<\/th>\n<th>Description<\/th>\n<th>Example<\/th>\n<\/tr>\n<tr>\n<td>Multi-factor Authentication<\/td>\n<td>Requires multiple forms of verification to access a system<\/td>\n<td>Using both a password and an authenticator app<\/td>\n<\/tr>\n<tr>\n<td>Authentication Requests<\/td>\n<td>Requests made to verify a user&#8217;s identity<\/td>\n<td>Requesting a one-time access code<\/td>\n<\/tr>\n<tr>\n<td>Single Sign-On<\/td>\n<td>Allows users to access multiple systems with one set of login credentials<\/td>\n<td>Logging into Google Workspace to access business systems<\/td>\n<\/tr>\n<tr>\n<td>Remote Access<\/td>\n<td>Accessing systems or networks from a location outside the premises<\/td>\n<td>Accessing company emails from a personal device<\/td>\n<\/tr>\n<tr>\n<td>Two-step Verification<\/td>\n<td>Utilizes two steps for authentication, often password and access code<\/td>\n<td>Requiring a password and a fingerprint scan<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is two factor authentication?<br \/>\nA: Two factor authentication (2FA) is an extra layer of\u2064 security\u200b that requires two methods of\u2062 verification\u200d or authentication in order to \u200caccess to computer or \u200donline accounts. It typically \u2062requires the user to provide two pieces\u2062 of evidence\u2063 or \u201cfactors\u201d of \u200dtheir identity,\u200b such \u2062as something \u2062they know (like a password \u2064or \u2062PIN) and something they have (like a security token or\u200d a mobile device).<\/p>\n<p>Q: How does \u200ctwo factor authentication work?<br \/>\nA: 2FA combines\u200c two\u2064 methods of authentication: something \u200dyou know \u2014 like a password or PIN \u2014 with something you have, such as a mobile device \u200bor\u2063 security token. This \u2064extra\u200d layer of security \u2062makes it difficult for hackers to access \u2064your accounts, even if\u200d they steal your username or password.<\/p>\n<p>Q: What are the benefits of two \u200cfactor authentication \u200cfor businesses?<br \/>\nA:\u2064 Businesses can benefit from 2FA \u200dby significantly increasing the security of their online accounts\u2063 and \u200ctransactions. It also saves businesses the time and cost associated with responding to\u200d <a href=\"https:\/\/logmeonce.com\/dangers-of-weak-password\/\">account-related security issues<\/a>. Additionally, two factor \u2062authentication can be used to limit access to certain \u2062areas of the business\u2019s \u200donline environment, such as its employee or customer \u2063portals.<\/p>\n<p>Q: What is Two Factor Authentication For Business and why is it important?<br \/>\nA: Two Factor Authentication (2FA) for business is a security process that requires users to provide two different authentication factors to verify their identity before granting access to a system or application. This adds an extra layer of security beyond just a traditional password, making it more difficult for unauthorized users to gain access to sensitive information. Two Factor Authentication is important for businesses as it helps protect against various security risks such as phishing attacks, brute force attacks, and social engineering attacks.<\/p>\n<p>Q: What are some common Two Factor Authentication methods used for business accounts?<br \/>\nA: Some common Two Factor Authentication methods used for business accounts include one-time passwords, verification codes sent to a mobile phone, voice recognition, authentication apps, fingerprint scans, facial recognition, PIN codes, SMS codes, and physical devices like security tokens or USB keys.<\/p>\n<p>Q: How does Two Factor Authentication help businesses enhance security?<br \/>\nA: Two Factor Authentication helps businesses enhance security by requiring users to provide two different factors of authentication, making it harder for unauthorized users to access sensitive information. This can help prevent unauthorized access attempts, reduce the risk of data breaches, and protect against various cyber attacks.<\/p>\n<p>Q: What are the benefits of using Two Factor Authentication for business accounts?<br \/>\nA: Some benefits of using Two Factor Authentication for business accounts include increased security for user accounts, protection against phishing attacks and other security risks, compliance with security standards and regulations, and peace of mind for both business owners and users.<\/p>\n<p>Q: Are there any drawbacks or limitations to using Two Factor Authentication for business accounts?<br \/>\nA: While Two Factor Authentication provides an extra layer of security, it can sometimes be inconvenient for users who have to go through additional authentication steps. Additionally, some Two Factor Authentication methods may have minimum system requirements or additional costs associated with implementation and maintenance.<\/p>\n<p>Q: How can businesses choose the right Two Factor Authentication solution for their needs?<br \/>\nA: Businesses should consider factors such as the level of security required, the user experience, compatibility with existing systems, and cost when choosing a Two Factor Authentication solution. It is important to evaluate the different authentication methods available and choose one that best fits the specific security requirements of the business.<\/p>\n<p>Q: What are some best practices for implementing Two Factor Authentication for business accounts?<br \/>\nA: Some best practices for implementing Two Factor Authentication for business accounts include educating users on the importance of strong passwords, establishing policies for password management, implementing Multi-Factor Authentication solutions like Duo Security, and regularly updating security measures to protect against evolving security threats.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Duo Security | Multi-Factor Authentication (MFA) &amp; Two-Factor Authentication&#8221; (duo.com\/)<br \/>\n&#8211; &#8220;Two Factor Authentication (2FA): What is it and How Does it Work&#8221; (csoonline.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Having learnt the importance\u2064 of two factor authentication for business, why \u200cnot create a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account and enjoy the additional layer of security, convenience, and peace-of-mind? \u2062With LogMeOnce\u2019s two factor authentication \u2063for business, you can use \u2063either FIDO U2F Security Key for Desktop Protection, or Mobile\u200d Protection, so \u200cthat you can be sure\u2064 that your business is \u200bsafe. \u200dDon\u2019t miss out on the great services of \u2064two factor authentication for business. Get protection today and stay secure!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Two-factor authentication for businesses is a powerful tool to keep essential business data safe.\u2064 By providing\u200d an \u2064extra layer of \u200dsecurity, businesses can protect their valuable information from hackers. It\u2062 is \u200da straightforward \u200cprocess that involves both physical and digital methods to verify user identity. With two-factor authentication, businesses can reduce the risk of unauthorized [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3764,885,15457,931,781,20078,1788],"class_list":["post-68598","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication-methods-2","tag-business","tag-business-security","tag-online-security","tag-security","tag-software-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68598","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68598"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68598\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68598"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68598"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68598"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}