{"id":68787,"date":"2024-06-19T20:28:31","date_gmt":"2024-06-19T20:28:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/11\/email-two-factor-authentication\/"},"modified":"2024-12-27T16:23:13","modified_gmt":"2024-12-27T16:23:13","slug":"email-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/","title":{"rendered":"Boost Your Email Security with Two Factor Authentication: Ultimate Guide"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200bEmail Two Factor Authentication is a key security measure that all online users\u200c should consider in today\u2019s world. It\u2019s a simple, \u200dcost effective way to protect your data from cyber criminals.\u2062 By \u2064adding this layer of \u2062protection,\u2062 you can ensure that\u200b your data remains \u200csafe and secure even when \u2063someone else has access\u2062 to\u200b your accounts. Email\u200d Two Factor Authentication requires\u2064 the user to enter\u200c their email address\u200b and \u200da unique code each\u200c time\u200d they log in, to verify \u2064their identity before \u200cgranting access to the\u200d account. This \u200ctwo-factor system \u2062is a great\u200c way to\u200b add an extra \u2062layer of security to protect your online accounts,\u2063 and can \u200bbe\u200c a great way to protect your data\u2064 and reputations\u2062 from theft, fraud and other\u200d cyber-related\u200d activity. Don\u2019t wait another \u2062minute to\u2062 start using email two-factor authentication, and stay \u200csafe \u200bonline.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#1_Get_Secure_Logins_%E2%81%A3with_Two-Step_Authentication_for%E2%80%8B_Your_Email\" >1. Get Secure Logins \u2063with Two-Step Authentication for\u200b Your Email<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#2_%E2%80%8CProtect_%E2%80%8CYour_Email_with%E2%80%8B_an_Extra_Layer_of_Protection\" >2. \u200cProtect \u200cYour Email with\u200b an Extra Layer of Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#3_Keep_Your%E2%81%A2_Account_Safe_with_Two-Step_Verification\" >3. Keep Your\u2062 Account Safe with Two-Step Verification<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#4_Keeping%E2%80%8B_Your%E2%81%A4_Email_%E2%80%8CSafe_%E2%81%A2with_%E2%81%A22FA_The_%E2%80%8CUltimate_Guide\" >4. Keeping\u200b Your\u2064 Email \u200cSafe \u2062with \u20622FA: The \u200cUltimate Guide<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#Overview_of_Authentication_Methods\" >Overview of Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/email-two-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-get-secure-logins-with-two-step-authentication-for-your-email\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_Get_Secure_Logins_%E2%81%A3with_Two-Step_Authentication_for%E2%80%8B_Your_Email\"><\/span>1. Get Secure Logins \u2063with Two-Step Authentication for\u200b Your Email<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The security of \u200cyour email\u200c should be of utmost importance.\u2064 To protect it\u200c from malicious \u2064actors,\u200b two-step authentication is a must-have. \u2064This authentication requires two factors, a\u2063 password and a verification code, to identify the\u2064 user. \u2062Here\u2019s how it works:<\/p>\n<ul>\n<li>You will enter your\u2063 password \u2062as usual\u200d when accessing\u2064 your\u2062 email.<\/li>\n<li>Next, \u200byou \u200dwill receive a \u200dconfirmation code on \u200cyour mobile\u2062 device.<\/li>\n<li>You will then enter the code \u2064in \u200byour\u2062 email login screen\u200b to authenticate.<\/li>\n<\/ul>\n<p><strong>Two-step\u2062 authentication \u200cprovides a\u200c layer of security to keep your email accounts\u200c safe\u2062 from unwanted access.<\/strong> \u200dOnce enabled, a\u200c hacker would not only need your password, but also have access to your\u200c mobile device to get into your account. There\u2064 is \u200cno single way a\u200d malicious \u2063user can \u200bhack your \u2064account, making \u200cit\u200c harder for them to get access to your important data.<\/p>\n<h2 id=\"2-protect-your-email-with-an-extra-layer-of-protection\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_%E2%80%8CProtect_%E2%80%8CYour_Email_with%E2%80%8B_an_Extra_Layer_of_Protection\"><\/span>2. \u200cProtect \u200cYour Email with\u200b an Extra Layer of Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>An \u2064extra layer of protection can mean the difference between a secure email account and \u200da vulnerable one. The following \u2064steps can help\u200b you bolster your defenses:<\/p>\n<ul>\n<li><strong>Use strong passwords.<\/strong> A strong password \u2013 \u200cone with a mix of characters,\u2064 numbers, and symbols \u2013 \u2064is\u2062 the best way to\u2062 protect your email accounts. Avoid things like\u200b names, \u200dbirthdays, and \u200dother commonly used elements in your passwords.<\/li>\n<li><strong>Enable two-factor authentication.<\/strong> It\u2019s\u200b more \u2063secure than traditional passwords\u2062 and adds an extra layer of \u2064protection around\u200d your \u2063accounts.\u2062 Two-factor authentication works \u2064by sending you\u2064 an\u200b SMS or email when an unfamiliar computer \u200blogs into your \u2064account.<\/li>\n<li><strong>Make sure your antivirus is updated.<\/strong> \u2064Run a regular check \u200cto make sure \u200dyour antivirus software is up to \u200bdate \u200cand \u2063doing its job. You should also consider adding a firewall to your computer and \u2062making\u2062 sure\u2063 it\u2019s active.<\/li>\n<li><strong>Watch for phishing scams.<\/strong> Be wary \u200cof suspicious emails and links, they could \u200dcontain viruses \u200cor malware. If\u2063 you\u2019re unsure of \u2064the source or\u2064 content of an \u2063email, don\u2019t click on it.<\/li>\n<\/ul>\n<p>By\u200b adding an extra \u200blayer of protection\u2062 around \u200dyour\u2063 email accounts, you can help minimize the risk \u2064of cyberattacks and\u2064 keep your information secure. Strong\u200c passwords, \u2062two-factor authentication,\u200b antivirus software, \u2062and a healthy dose of skepticism will all help to keep \u2064your\u2064 email\u200d account\u2064 safe.<\/p>\n<h2 id=\"3-keep-your-account-safe-with-two-step-verification\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_Keep_Your%E2%81%A2_Account_Safe_with_Two-Step_Verification\"><\/span>3. Keep Your\u2062 Account Safe with Two-Step Verification<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Two-step verification<\/strong> \u200dis a great way to keep your account safe. \u2062It adds an extra layer of protection\u200d to make sure that only you can access \u2062your account. Here are three \u200dsimple steps \u2063to set up two-step\u200c verification:<\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>Download an authenticator\u200c app like \u2063 Authenticator, Microsoft Authenticator or Google Authenticator<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul>\n<li>Go to\u200c the \u200csettings \u2062section of your\u2064 account and \u2062enable two-step verification<\/li>\n<li>Easy generate a code with your authenticator \u2063app and enter \u2062it whenever\u200c you want to log in<\/li>\n<\/ul>\n<p>Once \u200byou\u2019ve\u2064 enabled two-step verification,\u2062 your \u200baccount is \u200dnow ready\u2063 to be protected from\u200b unwanted logins. Your account will\u200c be safe \u2064even\u2063 if someone guesses \u200cyour password thanks to the\u200d extra step of entering a code from your\u2064 authenticator \u200bapp. So make sure you set up \u200byour two-step \u2064verification\u2063 and\u2063 stay safe!<\/p>\n<h2 id=\"4-keeping-your-email-safe-with-2fa-the-ultimate-guide\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_Keeping%E2%80%8B_Your%E2%81%A4_Email_%E2%80%8CSafe_%E2%81%A2with_%E2%81%A22FA_The_%E2%80%8CUltimate_Guide\"><\/span>4. Keeping\u200b Your\u2064 Email \u200cSafe \u2062with \u20622FA: The \u200cUltimate Guide<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Two-factor\u2064 authentication (2FA) is a simple but powerful way \u200cto keep your\u2062 email account\u200b secure. It\u2019s one of the most \u2063important \u200csteps you can take to ensure your emails are safe and \u2064protected \u200bfrom hackers and other online threats. Here\u2019s the ultimate guide to setting up\u2063 2FA\u2064 for your email service provider:<\/p>\n<ul>\n<li><b>Choose a 2FA option:<\/b> Most <a title=\"iPhone Voicemail Password Reset\" href=\"https:\/\/logmeonce.com\/resources\/iphone-voicemail-password-reset\/\" data-abc=\"true\">email service providers offer<\/a> several\u2062 options for 2FA authentication.\u2063 Choose from \u200cSMS codes, email codes, authenticator apps,\u2064 or hardware tokens.<\/li>\n<li><b>Set up your 2FA password:<\/b> Once you have chosen your option, create a strong, unique password for your\u2062 2FA setup. This password will be \u2063used\u200b to authenticate your access to your account each\u2064 time you log \u2062in.<\/li>\n<li><b>Enable 2FA for your email:<\/b> Log\u2063 in to your email \u200cservice provider and navigate to the 2FA setup page. Use your 2FA \u2064password \u2062to\u2064 activate \u2063the \u200dservice. You\u2064 will \u2063also need \u200dto provide contact information so you can\u2064 be \u200dcontacted in case of any security issues.<\/li>\n<li><b>Verify your \u200dsetup:<\/b> \u2062 Once\u200d you have activated 2FA, you\u2019ll \u2063need to\u2062 verify that the setup\u2062 is working correctly. Log in to your email service \u200band \u200dmake \u2062sure you are asked for your\u2062 2FA \u2064code. If not, go back and\u2062 make sure everything is \u2064set \u2064up\u2064 correctly.<\/li>\n<\/ul>\n<p>By following\u2063 these \u2062steps, you\u2064 can easily set up \u200b2FA for your email service \u200bprovider. Doing\u200b so will help to ensure that your emails are \u2062kept safe\u200d and secure\u2064 from malicious actors.\u2062 Even \u2062if someone were \u200cto\u2062 gain access to your account,\u200c they\u2063 wouldn\u2019t be able to gain \u2064access\u2062 unless \u2062they\u2063 also had access \u200bto your\u2063 2FA \u200ccode.<\/p>\n<p>Email Two Factor Authentication (2FA) is a vital security measure to protect online accounts from unauthorized access. By utilizing app-specific passwords, one-time passwords, time-based one-time passwords, and six-digit codes, users can add an extra layer of security to their login credentials. Backup codes and verification methods such as passwordless authentication and authentication tokens further enhance the level of security for user accounts. Dual-factor authentication, which combines something the user knows (like a password) with something they have (like a mobile device), is a common method of authentication used by online service providers and mobile services. Two-factor authentication not only safeguards against phishing attacks, but also provides a secure location for sensitive information. With a 45-day 2FA enrollment period and various authentication recovery methods, users can feel confident in the protection of their accounts. It is important for users to set up two-factor authentication on all of their online accounts to prevent hacks and ensure the security of their personal information. (Source: cisa.gov)<\/p>\n<h2 data-element-id=\"headingsMap-7-0\" data-headingsmap-highlight=\"true\"><span class=\"ez-toc-section\" id=\"Overview_of_Authentication_Methods\"><\/span>Overview of Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Two-Factor Authentication<\/th>\n<th>Biometric Authentication<\/th>\n<th>Application-Specific Password<\/th>\n<\/tr>\n<tr>\n<td>Security Level<\/td>\n<td>High<\/td>\n<td>Medium<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>User Experience<\/td>\n<td>Enhanced<\/td>\n<td>Convenient<\/td>\n<td>Easy<\/td>\n<\/tr>\n<tr>\n<td>Protection Against Phishing<\/td>\n<td>Yes<\/td>\n<td>No<\/td>\n<td>No<\/td>\n<\/tr>\n<tr>\n<td>Additional Resources<\/td>\n<td>Yes<\/td>\n<td>No<\/td>\n<td>No<\/td>\n<\/tr>\n<tr>\n<td>Ease of Setup<\/td>\n<td>Complex<\/td>\n<td>Simple<\/td>\n<td>Simple<\/td>\n<\/tr>\n<tr>\n<td>Compatibility<\/td>\n<td>Wide Range<\/td>\n<td>Limited<\/td>\n<td>Limited<\/td>\n<\/tr>\n<tr>\n<td>Users&#8217; Preference<\/td>\n<td>Increasing<\/td>\n<td>Moderate<\/td>\n<td>Decreasing<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: \u2063What \u2063is Two Factor Authentication (2FA)\u200b for email?<br \/>\nA: Two Factor \u200cAuthentication\u200b (2FA) is an extra layer of security for\u2062 your email account. \u200cIt requires you to provide two forms of identification, like\u2062 a password and\u200c a code sent to you via text or email. It helps keep your email safe from hackers \u200bwho might try to get into your \u200daccount.<\/p>\n<p>Q: Why\u200b should I use Email Two \u2062Factor Authentication?<br \/>\nA: Email Two Factor \u2064Authentication helps make your email account more\u200d secure. It makes it harder for \u200dhackers to access your\u2062 account, \u2062so \u2064your important information is kept \u2063safer. Plus, it \u2064helps \u2064you get back into your email if you forget\u2064 your password.<\/p>\n<p>Q: How does\u2064 Email Two Factor \u2063Authentication work?<br \/>\nA: When you use Email Two Factor Authentication, you enter your username\u200c and password like usual. \u200cThen, \u200dyou\u2019ll\u2062 get\u2063 sent a \u2062code or PIN \u2062to your \u200dphone or email. You\u2019ll need to enter that\u200d code \u200bor PIN to access your\u2063 email. \u2062If you don\u2019t enter the code, you won\u2019t be able to get into your email.<\/p>\n<p>Q: What is Email Two Factor Authentication?<br \/>\nA: Email Two Factor Authentication, also known as 2-step verification, is an additional layer of security that requires users to provide two different types of authentication factors before gaining access to their email account.<\/p>\n<p>Q: What are the different types of authentication factors used in Email Two Factor Authentication?<br \/>\nA: The authentication factors commonly used in Email Two Factor Authentication include something the user knows (such as a password), something the user has (such as a mobile phone for receiving authentication codes), and something the user is (such as a fingerprint or facial recognition).<\/p>\n<p>Q: How does Email Two Factor Authentication work?<br \/>\nA: When a user enables Email Two Factor Authentication, they will be required to enter their email account password as the first factor. Then, a second factor, such as a one-time code sent to their mobile phone or generated by an authentication app, is needed to complete the login process.<\/p>\n<p>Q: What are some common methods of obtaining the second factor for Email Two Factor Authentication?<br \/>\nA: Some common methods for obtaining the second factor in Email Two Factor Authentication include receiving authentication codes via SMS messages, push notifications from a mobile app, or using a physical security key.<\/p>\n<p>Q: Why is Email Two Factor Authentication important?<br \/>\nA: Email Two Factor Authentication provides an added layer of security to protect against phishing attacks, unauthorized access, and password theft. It helps to verify the identity of the user and strengthens the overall security of their email account.<\/p>\n<p>Q: What are some best practices for setting up Email Two Factor Authentication?<br \/>\nA: Users should choose strong and unique passwords for their email account, enable Email Two Factor Authentication using a secure method (such as a separate authentication app), and regularly review their security settings to ensure the highest level of protection for their email account.<\/p>\n<p><a href=\"https:\/\/myaccount.google.com\/\" target=\"_blank\" rel=\"noopener nofollow\" data-abc=\"true\">References<\/a>:<br \/>\n&#8211; &#8220;Two-factor authentication: What you need to know&#8221; by Google Security Blog<br \/>\n&#8211; &#8220;Email Security Best Practices&#8221; by Wittenberg Information Technology Services<br \/>\n&#8211; &#8220;Multi-Factor Authentication Overview&#8221; by Duo Security<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email \u200btwo-factor authentication is an essential security measure\u200c for \u200ball email accounts. Setting\u2062 up\u2064 two-factor authentication for your emails can \u2064help\u200c protect you\u200c from digital security \u200bthreats. LogMeOnce is \u200ban excellent\u200d choice for email two-factor\u2064 authentication, \u2064allowing \u200cusers to\u2063 easily secure their emails for free. So create your \u200dfree <a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> account today\u2064 and start enjoying the security\u2064 benefits of two-factor email authentication! Having this extra layer of security \u200con your emails will \u2062provide \u200dyou\u2063 peace of mind\u200b and\u200b protection against hackers, malware and\u2063 other digital\u2062 risks.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u200bEmail Two Factor Authentication is a key security measure that all online users\u200c should consider in today\u2019s world. It\u2019s a simple, \u200dcost effective way to protect your data from cyber criminals.\u2062 By \u2064adding this layer of \u2062protection,\u2062 you can ensure that\u200b your data remains \u200csafe and secure even when \u2063someone else has access\u2062 to\u200b your [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,975,2080,931,781,1788],"class_list":["post-68787","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-digital-security","tag-email","tag-online-security","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68787","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=68787"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68787\/revisions"}],"predecessor-version":[{"id":240016,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/68787\/revisions\/240016"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=68787"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=68787"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=68787"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}