{"id":69560,"date":"2024-06-20T00:12:45","date_gmt":"2024-06-20T00:12:45","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/multi-factor-authentication-best-practices\/"},"modified":"2024-06-22T06:06:52","modified_gmt":"2024-06-22T06:06:52","slug":"multi-factor-authentication-best-practices","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/","title":{"rendered":"Multi Factor Authentication Best Practices: Protect Your Data Today!"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u2062 Multi factor authentication (MFA) has\u2064 become an essential security best practice in today\u2019s digital world, enabling organizations to\u200d protect \u2064their data and protect \u200btheir customers from cyberattacks.\u200c The importance of MFA best practices can\u2019t be overstated, as \u200dthey offer \u2064organizations the\u200c necessary \u200dsecurity measures \u2062to secure their networks, data, and users. This article examines the various aspects of Multi Factor Authentication\u200b Best Practices to help organizations understand the importance of MFA\u2062 and \u200dhow\u200c to implement effective security protocols to \u200cprotect their\u200d customers. With the help of this guide, organizations can easily implement MFA\u2064 best practices to ensure their customers, data, and resources are secure from cyberattacks.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#1_Unlocking_%E2%80%8Cthe_Security%E2%80%8C_Benefits_of_Multi-Factor_Authentication\" >1. Unlocking \u200cthe Security\u200c Benefits of Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#2%E2%80%8B_Why_Multi-Factor_Authentication_is_Essential_in%E2%81%A2_2020\" >2.\u200b Why Multi-Factor Authentication is Essential in\u2062 2020?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#3%E2%80%8B_Best_Practices_for_Setting_Up_Multi-Factor%E2%81%A3_Authentication\" >3.\u200b Best Practices for Setting Up Multi-Factor\u2063 Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#4_Ensuring_Safe_and_Secure_Access_%E2%81%A3with_Multi-Factor_Authentication\" >4. Ensuring Safe and Secure Access \u2063with Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#Multi-Factor_Authentication_Components\" >Multi-Factor Authentication Components<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-best-practices\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-unlocking-the-security-benefits-of-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_Unlocking_%E2%80%8Cthe_Security%E2%80%8C_Benefits_of_Multi-Factor_Authentication\"><\/span>1. Unlocking \u200cthe Security\u200c Benefits of Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication (MFA) is key to ensuring\u200d secure\u200c access to online accounts\u200b and services. \u2063By requiring users to complete multiple tasks in order to log in, MFA provides\u200d an extra\u200c layer of security which drastically lowers the chances of a \u2063successful attack.\u200c Here are several\u2064 major security benefits of MFA:<\/p>\n<ul>\n<li>MFA adds complexity to a hacker\u2019s \u2064encroaching path \u2013 the more steps you require them to take, the less likely they will be able\u2063 to intrude your \u2063system.<\/li>\n<li>MFA can effectively avoid the \u200dcommonly used malicious attack methods such as \u2063phishing,\u2063 brute force, malicious scripts, and more.<\/li>\n<li>MFA requires different\u200c authentication methods\u2063 (SMS, token, biometrics, \u2062OTPs, etc.), which greatly \u200denhances the security system while taking into account the convenience of the users.<\/li>\n<li><strong>MFA makes it difficult for \u2063hackers to go through the verification process, \u200cas authentication must be validated in each step.<\/strong><\/li>\n<\/ul>\n<p>What\u2019s more, the\u2062 implementation of MFA can minimize the risk of data breaches caused by human\u2064 errors such as weak passwords. With\u2064 MFA, users are no \u2063longer limited to just one-time passwords \u2013 they can also use\u2064 other types of\u200c authentication methods for a more secure authentication \u2064process.<\/p>\n<h2 id=\"2-why-multi-factor-authentication-is-essential-in-2020\"><span class=\"ez-toc-section\" id=\"2%E2%80%8B_Why_Multi-Factor_Authentication_is_Essential_in%E2%81%A2_2020\"><\/span>2.\u200b Why Multi-Factor Authentication is Essential in\u2062 2020?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi-factor authentication (MFA) is gaining\u2062 traction in \u20622020\u2062 as a \u200dreliable, additional layer of security for online accounts. <\/strong>It\u2019s often seen as an effective safeguard for digital identities, as it requires \u2064a\u200b combination of two or more phases to access an account. Here are some key\u2064 benefits of implementing MFA in 2020:<\/p>\n<ul>\n<li>Prevent Identity\u200c Theft \u2013 MFA protects user identities, reducing the chances of passwords and usernames being misused.<\/li>\n<li>Stay on\u200b Top of \u2062Technology Changes \u2013 With an\u2064 MFA\u200b solution, you can stay ahead of\u2064 cybercriminals who are\u2064 increasingly sourcing\u200d more\u200b sophisticated\u200b and evolved \u2064methods \u2064to breach security.<\/li>\n<li>Safeguard Data \u2013 MFA allows accounts to\u2063 be locked down and controlled, \u2062so only authorized\u2062 users have access.<\/li>\n<li>Reduced Risk of Fraud\u200c \u2013 \u200cBy having multiple methods of authentication, MFA \u2063can reduce the risk of fraudulent transactions and hacking.<\/li>\n<li>Meeting Compliance\u200b Requirements \u2013 Banks and other financial institutions are increasingly implementing MFA in order to meet industry regulations.<\/li>\n<\/ul>\n<p>Moreover, with the increasing\u2064 adoption of MFA, \u200bcompanies now \u200chave the\u2063 ability\u200d to stay\u2063 ahead\u200b of persistent threats. MFA can provide business\u2064 owners with the necessary visibility to \u200dbetter \u200cprotect their networks \u200band customers, streamlining the process and minimizing the risk of data breach or fraud. Businesses can also regain control of their accounts, \u2063allowing them to better\u2064 monitor\u2063 their data and keep it\u200b safe.<\/p>\n<h2 id=\"3-best-practices-for-setting-up-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"3%E2%80%8B_Best_Practices_for_Setting_Up_Multi-Factor%E2%81%A3_Authentication\"><\/span>3.\u200b Best Practices for Setting Up Multi-Factor\u2063 Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA) is\u2062 a great way to keep your accounts safe and secure in \u200dthe online world. Here are some tips \u2064and\u2062 best \u2063practices\u2063 for setting up \u2064MFA \u200bto best protect \u2062yourself: \u200c<\/p>\n<ul>\n<li><strong>Choose a reputable provider: <\/strong>The first step is to choose \u2062an MFA provider \u200dthat you \u2064trust. Make sure to look \u200bat reviews online and investigate to make sure they have a good \u200creputation.<\/li>\n<li><strong>Choose a secure\u200d authentication method:<\/strong> \u200b There are various types of MFA, such as SMS messages,\u2062 app-based authentication, or biometric authentication.\u2062 Make sure to select the most secure method available.<\/li>\n<li><strong>Set up two-factor authentication: <\/strong>Setting up\u2062 two-factor\u200d authentication or \u200btwo-step verification can add\u200b an extra layer of\u200b protection to \u200cyour account. This means that\u2064 even if someone \u2064gets \u2063your username and password, they \u200bwon\u2019t be able to access \u200dyour account without going through an additional\u200d step.<\/li>\n<li><strong>Check\u200b for updates: <\/strong>Keep \u2063an eye out for MFA updates from your provider to make sure you are using the latest version. Regular updates are important to ensure \u2062that your account remains safe.<\/li>\n<\/ul>\n<p>Finally, be sure to store your MFA codes securely. Never share your codes\u2064 with \u200danyone, as they are meant to be used only by you \u2062for additional security.<\/p>\n<h2 id=\"4-ensuring-safe-and-secure-access-with-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Ensuring_Safe_and_Secure_Access_%E2%81%A3with_Multi-Factor_Authentication\"><\/span>4. Ensuring Safe and Secure Access \u2063with Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi-Factor authentication <\/strong>is a powerful solution \u200cto ensure \u200dsafe and secure access \u200bto your applications \u200band systems.\u2063 It \u2062requires \u2063two or \u200cmore \u2064authenticators to verify the identity\u200b of the user. This ensures that only authorized \u200dusers are accessing your system. \u200bHere are \u2062some of the\u200c advantages of multi- factor authentication:<\/p>\n<ul>\n<li>Provides an extra layer of security against hackers and cybercriminals.<\/li>\n<li>It\u200d helps protect your accounts even\u200c when passwords are stolen.<\/li>\n<li>The\u200b process of authentication can be customized according to your requirement.<\/li>\n<li>MFA also decreases the risk of data leakage \u2062due to social engineering attacks.<\/li>\n<\/ul>\n<p>The authentication process in MFA is easy\u200d and \u200dstraightforward. All user needs \u2064to do is provide a valid code, biometrics or password depending on the authenticating\u2064 factor. \u2063This ensures\u200d that\u200b only authorized users have access to your\u200b system. Enterprises should \u200binvest in MFA solution \u2064to ensure that their data is safe\u200b from unauthorized access.<\/p>\n<p>Multi-factor authentication (MFA) is becoming increasingly important in today&#8217;s digital landscape as cyber threats continue to evolve. By implementing MFA, organizations can enhance their security standards and add an extra layer of protection against bad actors. Weak links, such as using the same password across different accounts or relying solely on email addresses for authentication, can leave systems vulnerable to attacks. Regular assessments by security teams are essential to ensure the level of security meets compliance requirements and strengthens overall security strategy. Privileged users, remote employees, and network services all need to be secured with MFA to prevent unauthorized access. Using authentication hardware, adaptive authentication solutions, and backup authentication methods can further bolster security levels and protect critical systems and data. It is crucial for organizations to train users on MFA best practices and constantly monitor authentication logs for any suspicious activity. By following these best practices and staying informed about the latest cyber threats, organizations can mitigate risks and safeguard their digital assets effectively. (Source: www.securitymagazine.com)<\/p>\n<p>Multi-factor authentication (MFA) is a crucial aspect of ensuring strong authentication and security for user accounts and sensitive information. It involves using multiple layers of verification, such as email addresses, security questions, and authentication mechanisms like biometric scanners or security keys, to protect against unauthorized access. MFA adds an extra level of protection beyond traditional passwords, especially for privileged accounts and centralized authentication systems. In today&#8217;s threat landscape, with cyber actors constantly evolving their tactics, MFA is essential for defending against cyber incidents and online purchases. Additionally, Risk-Based Authentication helps to adapt security measures based on contextual user data and company networks, providing a more robust defense against cyber attacks and malware threats. By implementing best practices such as Adaptive MFA, backup codes, and constant attention to security settings, organizations can enhance their cybersecurity posture and protect customer data effectively.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Multi-Factor Authentication Best Practices and Key Considerations&#8221; by TechTarget<br \/>\n&#8211; &#8220;Multi-Factor Authentication: A Comprehensive Guide&#8221; by Security Boulevard<br \/>\n&#8211; &#8220;The Importance of Multi-Factor Authentication in Securing Corporate Networks&#8221; by IBM Security<br \/>\n&#8211; &#8220;Best Practices for Implementing Multi-Factor Authentication&#8221; by ISACA<\/p>\n<p>Multi-factor authentication (MFA) is a crucial component of a comprehensive cybersecurity strategy, helping to protect against a wide range of cybersecurity threats. By requiring users to provide multiple forms of verification before granting access, MFA adds an extra layer of security to traditional password-based authentication. Common forms of MFA include verification codes sent to email addresses or authenticator applications, as well as possession-based authentication through physical devices or additional hardware. Adaptive MFA systems can detect unknown devices or suspicious authentication attempts, adjusting the authentication requirements accordingly to ensure consistent security. It is important for organizations to implement MFA best practices, such as using strong and complex passwords, enabling additional security controls, and staying compliant with security regulations and standards.<\/p>\n<p><a href=\"https:\/\/smallbizepp.com\/iot-security-risks\/\" target=\"_blank\" rel=\"noopener nofollow\">Sources<\/a>:<br \/>\n&#8211; &#8220;What is multi-factor authentication (MFA)?&#8221; Microsoft. docs.microsoft.com<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multi-Factor_Authentication_Components\"><\/span>Multi-Factor Authentication Components<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>MFA Component<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Enhances security by requiring multiple factors for authentication.<\/td>\n<\/tr>\n<tr>\n<td>Email Address<\/td>\n<td>A common method used for authentication setup and communication.<\/td>\n<\/tr>\n<tr>\n<td>Password Manager<\/td>\n<td>Helps manage and secure passwords for online services.<\/td>\n<\/tr>\n<tr>\n<td>Adaptive Multi-Factor Authentication<\/td>\n<td>Adjusts security requirements based on user behavior and context.<\/td>\n<\/tr>\n<tr>\n<td>Network Devices<\/td>\n<td>Devices connected to the network that require authentication for access.<\/td>\n<\/tr>\n<tr>\n<td>Artificial Intelligence<\/td>\n<td>Utilized to enhance security and detect potential threats.<\/td>\n<\/tr>\n<tr>\n<td>Customer Experience<\/td>\n<td>Focuses on providing a seamless and secure authentication process for users.<\/td>\n<\/tr>\n<tr>\n<td>Compliance Standards<\/td>\n<td>Regulatory requirements that organizations must adhere to for security.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is multi factor\u2064 authentication?<br \/>\nA: \u200bMulti factor authentication (also known as MFA) is \u200ba security process that requires more than one\u2063 method of authentication\u200b from\u2063 independent sources before granting access to \u200ba protected resource.<\/p>\n<p>Q: What \u200bare the best\u200b practices for using multi factor authentication?<br \/>\nA: The best practices for using <a href=\"https:\/\/logmeonce.com\/schedule-login\/\">multi factor authentication include\u2063 implementing strong passwords<\/a>, using two-factor authentication, using a secure biometric identification\u2064 system, \u2062and regularly \u2063updating authentication protocols.<\/p>\n<p>Q: How do I make sure the authentication system is secure?<br \/>\nA: To make sure your authentication system \u200bis\u2064 secure, use an advanced authentication system that integrates proven security protocols\u200d and <a href=\"https:\/\/logmeonce.com\/passwordless-photo-login\/\">utilizes strong encryption standards<\/a>. Additionally, use multi factor authentication to verify the identity of users attempting to access sensitive data.<\/p>\n<p>Q: What are some best practices for implementing Multi-Factor Authentication (MFA)?<br \/>\nA: Some best practices for implementing Multi-Factor Authentication (MFA) include using a combination of authentication factors such as something you know (like a password), something you have (like a hardware token), and something you are (like a biometric scan) to enhance security. It is also important to regularly assess and update the MFA setup to address any security vulnerabilities that may arise.<\/p>\n<p>Q: How can organizations enhance user experience with MFA?<br \/>\nA: Organizations can enhance user experience with MFA by offering a variety of authentication options such as authenticator apps or push notifications on mobile devices. Adaptive MFA can also help improve user experience by only prompting for additional factors when necessary, based on factors like time of day or user location.<\/p>\n<p>Q: How can organizations protect against phishing attacks with MFA?<br \/>\nA: Organizations can protect against phishing attacks with MFA by requiring additional authentication factors beyond just a password. This can include one-time codes sent to a mobile device or email verification. Adaptive MFA can also help by detecting unauthorized users or suspicious login attempts.<\/p>\n<p>Q: What are some common authentication factors used in MFA?<br \/>\nA: Common authentication factors used in MFA include passwords, security tokens, biometric factors like facial recognition or retina scans, and one-time codes sent via SMS or email. These factors help create multiple layers of security to protect against unauthorized access. (Source: soonline.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>By \u2063following the\u200d best \u2064practices of multi-factor authentication and creating a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account, you\u200d can rest assured that your data is secure. Secure authentication \u200dis one of the most essential aspects of best \u200dpractices for\u2064 multi factor authentication, making an ideal choice for \u2062ensuring data privacy and safety.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u2062 Multi factor authentication (MFA) has\u2064 become an essential security best practice in today\u2019s digital world, enabling organizations to\u200d protect \u2064their data and protect \u200btheir customers from cyberattacks.\u200c The importance of MFA best practices can\u2019t be overstated, as \u200dthey offer \u2064organizations the\u200c necessary \u200dsecurity measures \u2062to secure their networks, data, and users. This article examines [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[935,5835,1294,8101,5708,19815,20528,16071,781,3028],"class_list":["post-69560","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-cybersecurity","tag-privacy-2","tag-authentication","tag-best","tag-data","tag-factor","tag-multi","tag-practices","tag-security","tag-two-factor"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69560","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69560"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69560\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69560"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69560"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69560"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}