{"id":69364,"date":"2024-06-19T23:58:37","date_gmt":"2024-06-19T23:58:37","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/online-multi-factor-authentication\/"},"modified":"2024-08-19T14:15:59","modified_gmt":"2024-08-19T14:15:59","slug":"online-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/","title":{"rendered":"Boost Your Online Security with Multi Factor Authentication &#8211; Learn How!"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Computer security is \u2063a growing concern as people become more reliant on technology \u200cfor \u200ceveryday tasks. \u2063One security \u2063measure\u2063 that has become increasingly \u2064popular is Online Multi Factor Authentication. This\u200b technology adds an\u200d additional layer of \u2063security that can \u2063help protect \u200dyour online \u2064accounts by requiring \u200dmore than one\u2064 form of verification before granting access. It is a simple but powerful way to make\u200c sure that only authorized people\u2064 have\u200d access to your data and\u200b thus increase its\u200b security. \u200bBy using Online Multi Factor Authentication, users can \u2062be sure that their online accounts are \u2063well\u200b protected \u2062against malicious attacks \u200dand data breaches.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#1_Strengthen_Your_Security_with_%E2%80%8COnline_%E2%81%A3Multi_Factor_Authentication\" >1. Strengthen Your Security with \u200cOnline \u2063Multi Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#2_Make_Your_Logins_%E2%81%A4More_Secure_with_Multi_%E2%81%A3Factor_Authentication\" >2. Make Your Logins \u2064More Secure with Multi \u2063Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#3_What_is_Online_Multi_Factor_Authentication\" >3. What is Online Multi Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#4_Protect_Your_Online_Access_with_Two_%E2%81%A4or_%E2%81%A3More_Factors\" >4. Protect Your Online Access with Two \u2064or \u2063More Factors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#Multifactor_Authentication_Methods_Comparison\" >Multifactor Authentication Methods Comparison<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/online-multi-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-strengthen-your-security-with-online-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Strengthen_Your_Security_with_%E2%80%8COnline_%E2%81%A3Multi_Factor_Authentication\"><\/span>1. Strengthen Your Security with \u200cOnline \u2063Multi Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi factor authentication (MFA)\u200d is essential \u200cfor protecting your online accounts.<\/strong> Once configured, MFA requires two or more different methods to verify your\u2063 identity,\u200b making it virtually impossible for \u200chackers to gain access. Here\u200c are some of\u2062 the benefits of using MFA \u2064for online security.<\/p>\n<ul>\n<li>Protects against password \u200btheft: MFA requires the user\u200b to\u200c enter a unique, one-time passcode to verify their\u200d identity.\u200c This prevents \u200bmalicious actors from accessing your accounts, even if they manage \u200dto\u2063 steal your credentials.<\/li>\n<li>Reduces\u200c risk\u200c of phishing attempts: It is\u2063 difficult \u2062for hackers to establish a connection between the two factors of \u2064your \u2063authentication, <a href=\"https:\/\/logmeonce.com\/business-total-security\/\">meaning\u200c online \u2063phishing attacks<\/a> will be\u2064 harder to pull off.<\/li>\n<li>Secure access on multiple devices: Unlike single-factor authentication, MFA allows secure access to your accounts on multiple devices, locking hackers out if they happen \u200bto log in from a \u2063different device\u200b or a different\u2062 location.<\/li>\n<\/ul>\n<p><strong>It is also easy to set\u2064 up and use:<\/strong> You can configure MFA on \u200dyour mobile\u200b device or desktop \u2063computer using a step-by-step\u2064 process.\u200b Once configured, the process is \u200csimple and \u2063straightforward. \u2063All you \u2064need to do is enter the one-time code \u2064and you will be logged\u2063 in\u2064 securely.<\/p>\n<h2 id=\"2-make-your-logins-more-secure-with-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_Make_Your_Logins_%E2%81%A4More_Secure_with_Multi_%E2%81%A3Factor_Authentication\"><\/span>2. Make Your Logins \u2064More Secure with Multi \u2063Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Are you\u2064 worried about your website security?\u2063 It\u2019s\u2064 more important than ever to \u200btake extra steps \u2062to make your logins more secure.\u2063 Multi Factor \u200cAuthentication\u200d (MFA) is an easy\u200b way to go the extra mile for your security. Here\u2019s why MFA\u200d is the \u2062best choice for online\u200d security:<\/p>\n<p><strong>1. Easier to Track Logins: <\/strong>MFA requires \u200bmore than just a username and password for login. This makes\u2064 it easier \u2063to \u200btrack logins. Now\u2063 you \u200ccan ensure that\u2063 only authorized personnel can access\u2063 your online\u200b accounts, \u200dwith quick detection if anyone unhidden tries\u2062 to log in.<\/p>\n<p><strong>2. It\u2019s Multi-Layered:<\/strong> MFA uses\u200c multiple layers of\u2063 authentication, such \u200bas one-time passwords, \u200bfingerprints, biometric\u200d scans and\u200c questionnaires. Even\u200b if \u2062your credentials are compromised,\u2064 with\u2064 MFA \u2063they can\u2019t be \u2063used\u200c to access your accounts.<\/p>\n<p><strong>3. Flexible\u200b User Authentication: \u200b <\/strong>You can tailor \u2062MFA for individual needs \u200band deploy\u200c the authentication method that\u200c works best for the specific user. This \u2063gives you \u200cmore control over who can access specific accounts.<\/p>\n<p><strong>4. Security \u2062Alerts: <\/strong>MFA allows you to customize your security alerts, so if any suspicious activity is \u200ddetected, you\u2019ll be notified right away through email\u2064 or \u2062SMS.<\/p>\n<p>Multi Factor\u200d Authentication \u2063isn\u2019t just\u200c great\u2063 for online security, \u200bit\u2019s also \u2062great for peace \u2064of mind. Now you can rest assured that your accounts and data are safe and secure. So what are you waiting for?\u2062 Start making more secure logins\u2064 with MFA today!<\/p>\n<h2 id=\"3-what-is-online-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"3_What_is_Online_Multi_Factor_Authentication\"><\/span>3. What is Online Multi Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi Factor Authentication \u200cExplained<\/strong><\/p>\n<p>Multi \u2063Factor Authentication, or MFA, is a \u200cway \u2063of securing\u200c online\u2064 accounts with multiple layers of \u200dverification. By using \u2064a combination of confirming\u200c factors, like \u200cpasswords\u200d and \u200cadditional security questions, MFA helps to prevent unauthorized access to your accounts.<\/p>\n<p>Using only a password to secure an account leaves it vulnerable to hacking,\u200b however\u2064 adding an additional layer \u2064of \u200c<a href=\"https:\/\/logmeonce.com\/passwordless-mfa\/\">security prevent unauthorized access<\/a>. MFA requires users to meet two or\u200b more\u2063 criteria before\u2062 they can log in. This could\u2062 include a password as well as one of the following:<\/p>\n<ul>\n<li>A physical hardware token<\/li>\n<li>A \u200dbiometric identifier (such as a fingerprint)<\/li>\n<li>A\u2064 one-time \u2063code sent to a user\u2019s phone<\/li>\n<\/ul>\n<p>These additional steps \u2062make it \u200cmuch harder for someone \u200bto gain access to your account without permission. Even \u200dif a hacker manages to find out the password to one account, \u2062they\u2019ll still\u2064 need to\u200b get past the other factors to gain entry.<\/p>\n<h2 id=\"4-protect-your-online-access-with-two-or-more-factors\"><span class=\"ez-toc-section\" id=\"4_Protect_Your_Online_Access_with_Two_%E2%81%A4or_%E2%81%A3More_Factors\"><\/span>4. Protect Your Online Access with Two \u2064or \u2063More Factors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>People\u2019s online accounts\u200c and data can\u2064 be vulnerable to breaches and hacks. \u200cTo \u2062keep your \u2063data\u2064 secure, one of the\u2063 best \u2062defense measures is to use\u200b two or more factors when logging into your accounts. Also known \u2064as \u201cmulti-factor authentication\u201d, this \u200dsimply means that you need\u200c two or more identifiers to access\u200b your online accounts. \u2063Here are some\u200c tips for\u2063 protecting \u200byour data\u200c with two \u2063or more factors:<\/p>\n<ul>\n<li><strong>Keep \u2064Your Passwords\u2062 Unique<\/strong> \u2013 The most common form of two-factor \u2063authentication \u200bis using a username\u200c and password. To ensure that your\u2064 accounts \u200dare as secure as\u200c possible, \u200buse unique and strong passwords for each of\u200d your accounts, as well as\u2064 change\u2064 them\u2062 every\u200b few months. \u200d<\/li>\n<li><strong>Utilize Biometric Security<\/strong> \u2062 \u2013 Many online accounts allow \u200cyou to use\u200d biometric security such \u200das fingerprint scanners or facial recognition technology to access them. This \u2063is an incredibly \u200bsafe\u2064 option for securing your data, as biometric information is almost impossible to replicate.<\/li>\n<li><strong>Use Mobile\u2063 Authentication Tools<\/strong> \u2013 Many online services offer two-factor\u2063 authentication, allowing you \u200bto receive\u2062 a\u200b one-time authentication key \u200don your smartphone. In addition to being easier to use\u2062 than other methods, \u200cthis \u2063option\u200b adds a layer\u2063 of convenience \u200dto your online security.<\/li>\n<\/ul>\n<p>Keeping your data secure on the internet\u200c is becoming increasingly\u200b important.\u200b Make sure \u2062that your online accounts are protected by using two or more factors when logging in. That way,\u200c if someone were to gain access to one\u2062 of your accounts, they \u200cwould be blocked from accessing\u2064 the \u200crest.<\/p>\n<p>Online Multi-Factor Authentication (MFA) is a crucial security measure that provides an additional layer of protection for users. MFA requires multiple types of authentication factors, such as something the user knows (like a password), something they have (like a security token), or something they are (like a fingerprint scan). This multi-step verification process helps to secure sensitive information and prevent unauthorized access to online accounts. Some common types of MFA include two-factor authentication, biometric authentication, and security tokens. These methods help to make it more difficult for hackers to gain access to personal or corporate data, providing peace of mind for users. Additionally, MFA can help to mitigate the risks of phishing attacks, brute-force attacks, and man-in-the-middle attacks. Overall, implementing MFA is essential for enhancing digital security in today&#8217;s interconnected world (Department of Homeland Security, 2017).<\/p>\n<p>Online multi-factor authentication is a crucial security measure that adds an extra layer of protection to sensitive information and accounts. Utilizing a combination of factors such as mobile devices, two-step verification, credit cards, physical devices, authentication codes, and even retina scans, multi-factor authentication ensures that only authorized users can access data. This form of authentication has evolved to include risk-based authentication, adaptive authentication, and phishing-resistant MFA, making it more robust and difficult for hackers to breach. With the rise of artificial intelligence and facial recognition software, the authentication process has become even more sophisticated and secure. Additionally, the use of strong customer authentication and two-factor authentication solutions has become standard practice in industries such as financial services and cloud security. Due to the ever-evolving nature of cyber threats, it is essential for businesses to invest in multi-factor authentication systems to protect their networks and sensitive information.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;What is Multi-Factor Authentication (MFA)?&#8221; Duo Security, duo.com.<\/p>\n<p>Multi-factor authentication is a crucial security measure that involves the use of additional factors beyond just a password to verify a user&#8217;s identity. Some common factors include possession factors such as hardware devices or physical objects, knowledge factors like complex passwords or pin codes, and inherence factors such as facial scans or fingerprint readers. The use of multiple authentication requirements adds an extra layer of protection to prevent unauthorized access to accounts or sensitive information. Various authentication methods, like SMS-based verification or app-specific passwords, are commonly used in online systems. Additionally, behavioral biometrics and time-based authentication add further security measures by considering factors like the user&#8217;s behavior patterns or the time of day of the authentication attempt. With the rise of cyber threats, the importance of implementing a robust multi-factor authentication system cannot be overstated.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20210406235123\/https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\" target=\"_blank\" rel=\"noopener nofollow\">Sources<\/a>:<br \/>\n&#8211; &#8220;Two-factor authentication&#8221; &#8211; Wikipedia: en.wikipedia.org<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multifactor_Authentication_Methods_Comparison\"><\/span>Multifactor Authentication Methods Comparison<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Multifactor Authentication Method<\/th>\n<th>Level of Security<\/th>\n<th>Ease of Use<\/th>\n<th>Cost<\/th>\n<\/tr>\n<tr>\n<td>Multi-factor authentication<\/td>\n<td>High<\/td>\n<td>Moderate<\/td>\n<td>Medium<\/td>\n<\/tr>\n<tr>\n<td>2-Step verification<\/td>\n<td>Medium<\/td>\n<td>Easy<\/td>\n<td>Low<\/td>\n<\/tr>\n<tr>\n<td>Physical token<\/td>\n<td>High<\/td>\n<td>Low<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>Facial authentication<\/td>\n<td>Medium<\/td>\n<td>Moderate<\/td>\n<td>High<\/td>\n<\/tr>\n<tr>\n<td>USB ports<\/td>\n<td>Low<\/td>\n<td>Easy<\/td>\n<td>Low<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Online Multi Factor Authentication?<br \/>\nA: Online Multi Factor Authentication\u200d (MFA) is \u200da process to \u2064make sure that \u2063people\u200b logging into online accounts\u2062 are \u2063who they say they are. \u2064It works by prompting them \u2063to prove their identity by providing two or more pieces of \u200dinformation, such as a password and a code sent to their cell phone. \u2062The goal is to make sure only authorized users can access online accounts. \u200b<\/p>\n<p>Q: What is Online Multi-Factor Authentication?<\/p>\n<p>A: Online Multi-Factor Authentication (MFA) is a security system that requires multiple methods of verification to confirm the user&#8217;s identity before granting access to a system or application. It adds extra layers of security beyond just a password to protect against unauthorized access.<\/p>\n<p>Q: What are some examples of authentication factors in MFA?<\/p>\n<p>A: Authentication factors in MFA include something the user knows (such as a password), something the user has (such as a smart card or mobile phone), and something the user is (such as a fingerprint scan or facial recognition).<\/p>\n<p>Q: How does MFA protect against security risks like phishing attacks?<\/p>\n<p>A: MFA helps protect against phishing attacks by requiring additional verification beyond just a password. Even if a hacker obtains a user&#8217;s password through phishing, they would still need the second authentication factor to gain access.<\/p>\n<p>Q: What are some common methods of implementing MFA?<\/p>\n<p>A: Common methods of implementing MFA include using software tokens, authenticator apps, SMS text messages, security keys, and biometric verification methods like fingerprint scans or facial recognition.<\/p>\n<p>Q: How does MFA enhance the level of security for user identity?<\/p>\n<p>A: MFA enhances the level of security for user identity by adding extra security layers that make it more difficult for unauthorized users to access sensitive information. By requiring multiple authentication factors, MFA helps ensure that the person trying to access the system is who they claim to be.<\/p>\n<p>Q: What are some drawbacks of authentication that MFA addresses?<\/p>\n<p>A: MFA addresses drawbacks of single-factor authentication methods, such as passwords, that can be easily compromised. By adding additional authentication factors, MFA provides more robust protection against unauthorized access.<\/p>\n<p>(Source: csoonline.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As\u2064 you can see, Online Multi Factor Authentication \u200bis vital for \u200bbusinesses \u200bto keep their data\u200b secure. It\u2019s worth investing in a secure, all-in-one solution like\u2062 LogMeOnce, \u200dwhere you can manage \u200ball your passwords and authentication methods in one place. LogMeOnce offers the best secure \u2062Multi-Factor Authentication\u2062 process and is the perfect choice for businesses looking\u2064 to\u2063 keep their data safe and secure. Plus, you\u200d can even get \u2063a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>\u2063 account with no strings attached. Don\u2019t let data \u200cinsecurity be a risk factor\u2064 for\u200b your business; make sure you\u2019re protected today with LogMeOnce\u2019s \u2064Multi Factor Authentication technology.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Computer security is \u2063a growing concern as people become more reliant on technology \u200cfor \u200ceveryday tasks. \u2063One security \u2063measure\u2063 that has become increasingly \u2064popular is Online Multi Factor Authentication. This\u200b technology adds an\u200d additional layer of \u2063security that can \u2063help protect \u200dyour online \u2064accounts by requiring \u200dmore than one\u2064 form of verification before granting access. [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1955,1294,1793,10933,996,781],"class_list":["post-69364","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-online","tag-authentication","tag-identity-verification","tag-multi-factor-authentication","tag-passwords","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69364","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69364"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69364\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69364"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69364"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69364"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}