{"id":69743,"date":"2024-06-20T01:23:31","date_gmt":"2024-06-20T01:23:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/12\/difference-between-mfa-and-2fa\/"},"modified":"2024-08-20T15:50:04","modified_gmt":"2024-08-20T15:50:04","slug":"difference-between-mfa-and-2fa","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/","title":{"rendered":"Unlock the Secrets: Difference Between MFA And 2FA Explained"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>\u200c Are \u200dyou aware of \u200bthe\u2063 two most popular authentication methods \u2063currently in use: Multifactor \u200cauthentication \u200b(MFA) and two-factor authentication (2FA)? Have you been asking yourself what is the difference \u200cbetween MFA and\u200c 2FA?\u2063 MFA, or Multifactor \u2062Authentication, provides \u2062more advanced security protection than\u2062 2FA, Two-Factor Authentication, making it\u2064 the more secure option. \u200bWith 2FA, users are required to \u200benter two separate\u200b authentication codes, while \u200dwith\u200d MFA, they must enter several security\u2063 codes\u200d to complete the\u200c authentication process. This \u2062article \u2063will \u2064explain the difference between MFA \u2064and 2FA \u2062to\u200c help you decide which authentication method \u2063best suits your needs.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#1_%E2%80%8DWhat%E2%80%8D_is_%E2%81%A3the_Difference_Between_%E2%80%8CMFA_%E2%80%8Dand_2FA\" >1. \u200dWhat\u200d is \u2063the Difference Between \u200cMFA \u200dand 2FA?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#2%E2%80%8D_Understanding_Multi-Factor_Authentication_MFA\" >2.\u200d Understanding Multi-Factor Authentication (MFA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#3_Exploring_Two-Factor_Authentication_2FA\" >3. Exploring Two-Factor Authentication (2FA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#4_Which_Method_is_More%E2%80%8C_Secure\" >4. Which Method is More\u200c Secure?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#Key_Concepts_in_Multi-Factor_Authentication\" >Key Concepts in Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/difference-between-mfa-and-2fa\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-the-difference-between-mfa-and-2fa\"><span class=\"ez-toc-section\" id=\"1_%E2%80%8DWhat%E2%80%8D_is_%E2%81%A3the_Difference_Between_%E2%80%8CMFA_%E2%80%8Dand_2FA\"><\/span>1. \u200dWhat\u200d is \u2063the Difference Between \u200cMFA \u200dand 2FA?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi-factor\u200c authentication (MFA)<\/b> is a type of \u2063authentication that requires more than one \u200bverification\u2064 step to access an account or system. \u200cThis\u2062 type of authentication \u200crequires the user to prove their\u2064 identity by using two or more factors before gaining access \u2013 such \u200das\u200b a \u2062password, plus a one-time\u200d code sent to an email \u200caddress or mobile phone. It\u2019s a great way to ensure the \u200csecurity of \u2064your accounts and data.<\/p>\n<p><b>Two-factor authentication (2FA)<\/b> \u2064 is a more specific\u2064 type of multi-factor authentication. 2FA requires at least two different types of\u200b credentials to access an account. The most common types are something you have (such as a \u2064mobile \u200bdevice or a physical authenticator key) and something you\u200d know (like a password). Generally, 2FA is used to provide an extra layer of security when accessing \u200dan account. It\u2019s important to use strong, unique passwords and back them up\u2064 to a secure location when using 2FA.<\/p>\n<p>Here\u2019s a helpful unnumbered list distinguishing MFA and 2FA at a glance:<\/p>\n<ul>\n<li><b>MFA<\/b>: requires two or more factors\u200d to prove identity and gain \u2063access.<\/li>\n<li><b>2FA<\/b>: requires two\u2063 different types of\u200b credentials \u2063like something you have and something you know.<\/li>\n<li><b>MFA<\/b>: used\u2064 to secure accounts and data.<\/li>\n<li><b>2FA<\/b>: used to provide \u200ban\u2064 extra layer of security.<\/li>\n<\/ul>\n<h2 id=\"2-understanding-multi-factor-authentication-mfa\"><span class=\"ez-toc-section\" id=\"2%E2%80%8D_Understanding_Multi-Factor_Authentication_MFA\"><\/span>2.\u200d Understanding Multi-Factor Authentication (MFA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication\u2062 (MFA) is a reliable security method that adds another\u2064 layer of protection to user accounts\u2064 and data. It requires multiple factors to be presented during\u200d the authentication process, thus making it harder for unauthorised users to gain access. MFA can be\u200c divided into three categories:<\/p>\n<ul>\n<li>Something you know like a password or a PIN<\/li>\n<li>Something you have like a security token or \u200dmobile device<\/li>\n<li>Something you are like a fingerprint\u2062 or \u200cvoice print<\/li>\n<\/ul>\n<p>MFA is increasingly becoming essential \u2062for many organisations \u2063as the digital\u2063 world grows\u200c and hackers become \u200bmore sophisticated in\u2064 their \u2063tactics. MFA \u200brequires\u2062 two or more of these methods to\u2063 authenticate a user, thus making it much harder for hackers to succeed \u200bin a\u2063 cyber-attack. This method helps to \u200creduce the \u2063risk of data breaches, \u200bas well \u2062as protecting users \u2062accounts from unauthorised \u200daccess. \u200bIt also helps to detect potential fraud\u2064 and prevent it from taking place. \u200bWhile traditional authentication methods like passwords are\u200c still used,\u200c combining them with other\u200b authentication methods provides \u200ca much\u200d stronger\u200d security protocol.<\/p>\n<p>By implementing\u200b MFA, organisations can \u200creduce the risk\u2062 of \u2064data breaches significantly, as each factor needs to \u2062be verified before access is granted. This makes it much harder for hackers to gain access to user \u2063accounts, as they\u2019ll need to prove their identity in \u200dmultiple ways. Additionally, MFA helps to protect \u2064users from potential \u2063phishing attempts as well, ensuring their data \u200bis secure at all times.<\/p>\n<h2 id=\"3-exploring-two-factor-authentication-2fa\"><span class=\"ez-toc-section\" id=\"3_Exploring_Two-Factor_Authentication_2FA\"><\/span>3. Exploring Two-Factor Authentication (2FA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>What is Two-Factor Authentication \u2063(2FA)?<\/strong><\/p>\n<p>2FA\u2064 is a security measure to help\u200d protect online accounts. It \u2062requires \u200cusers to use \u2062two \u2062different\u200c points\u200d of authentication \u200dto access an account. This \u200bis usually done by combining \u2062something a \u200buser knows (such as a password) with something they have \u200c(like a phone or token). This\u2063 makes it much harder for someone to gain access to\u200b an account without\u200d permission.<\/p>\n<p><strong>Benefits of Two-Factor Authentication (2FA)<\/strong><\/p>\n<p>Using 2FA can help increase the security of many online accounts \u2064and protect users from unauthorized access. Here\u200d are some of the benefits of using 2FA:<\/p>\n<ul>\n<li>Increased security:\u2063 2FA makes it much more difficult for \u2062hackers to access accounts.<\/li>\n<li>Privacy protection: 2FA helps\u200c protect sensitive information from falling into the\u200c wrong hands.<\/li>\n<li>Better user experience: 2FA helps make online accounts\u2063 more user friendly and \u200ceasier to access.<\/li>\n<\/ul>\n<p>It can \u2064also help protect\u200d accounts\u200d from phishing attacks, where hackers\u2064 can use stolen information to\u200c gain access to accounts.<\/p>\n<h2 id=\"4-which-method-is-more-secure\"><span class=\"ez-toc-section\" id=\"4_Which_Method_is_More%E2%80%8C_Secure\"><\/span>4. Which Method is More\u200c Secure?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When comparing\u200c the security of different methods, it \u200bis \u200bimportant \u2062to\u200d consider factors such as \u200duser authentication, data security, access restrictions, encryption, and\u2063 system updates. Here are some points to consider\u200d when considering which method is the most \u200csecure:<\/p>\n<ul>\n<li><b>User Authentication:<\/b> Does the method \u200brequire users to log\u2062 in with secure\u2062 credentials?<\/li>\n<li><b>Data Security:<\/b> How secure is\u2062 the data that is stored or transferred? Does it\u2064 use a secure format and encryption?<\/li>\n<li><b>Access\u200c Restrictions:<\/b> \u200d How does the method \u200blimit access to data and resources? Does it require approval or authentication?<\/li>\n<li><b>Encryption:<\/b> How is data encrypted? Does the method use strong\u200d encryption protocols?<\/li>\n<li><b>System Updates:<\/b> Does\u200b the\u2062 method have regularly\u2064 scheduled updates \u200cto ensure security?<\/li>\n<\/ul>\n<p>By carefully reviewing these points,\u2062 you \u200dcan assess which method\u2064 is likely \u200cto be more secure. When \u2063choosing a method, consider that security\u2063 should\u200d always \u200dbe addressed early on \u200dand frequently\u2062 evaluated to protect data and resources. \u2063Taking the time \u2064to adequately assess security needs can\u200c go\u200d a \u200blong way in preventing\u200d data breaches or other security issues.<\/p>\n<p>Multi-factor authentication (MFA) and two-factor authentication (2FA) are both methods of enhancing security by requiring users to provide multiple pieces of evidence to verify their identity before granting access to a system or account. While single-factor authentication relies on just one method of verification, such as a password, MFA and 2FA use additional factors such as biometric scans (like a retina scan or fingerprint scanner), one-time passwords, voice recognition, or behavioral characteristics (such as location or device behavior) to confirm the user&#8217;s identity. Implementing multiple layers of authentication increases the level of security and reduces the risk of unauthorized access, especially when weak passwords are involved. Businesses, financial institutions, and online payment services have adopted MFA and 2FA as secure authentication methods to protect against cyber threats and identity theft. By utilizing secure forms of identification and additional authentication methods, organizations can provide users with a smooth and intuitive authentication experience while safeguarding their digital resources. With the ongoing evolution of security standards and continuous user verification, MFA and 2FA remain effective security measures in today&#8217;s cybersecurity ecosystem. (Sources: Forbes, Cybersecurity and Infrastructure Security Agency, National Institute of Standards and Technology)<\/p>\n<p>Multi-factor authentication (MFA) and two-factor authentication (2FA) are secure methods used for personal identification and access to online resources. While 2FA typically involves the use of a one-time code in addition to a password, MFA goes a step further by incorporating various factors such as location behavior, recognition signals, and biometric factors for enhanced security. These additional factors serve as multiple layers of security, reducing security risks associated with single sign-on authentication solutions. Some common factors for authentication include inherence authentication factor, knowledge authentication factors, and possession authentication factors. By using hardware devices, artificial intelligence, and adaptive authentication methods, businesses can ensure a secure login process that protects against unauthorized access and identity theft. It is important to continuously educate employees on effective authentication practices and ongoing security awareness to maintain a secure and compliant environment. Businesses should also consider adopting risk-based authentication and continuous authentication methods to provide users with a smooth and intuitive experience while safeguarding against potential attack vectors. The adoption rate of MFA and 2FA is increasing, as more organizations recognize the importance of implementing strong customer authentication mechanisms to protect sensitive data and foster consumer trust in the digital realm.<\/p>\n<p>Sources:<br \/>\n1. &#8220;Multi-factor authentication (MFA)&#8221; &#8211; National Institute of Standards and Technology (NIST) Special Publication 800-63-3<br \/>\n2. &#8220;NIST&#8217;s Digital Authentication Guideline&#8221; &#8211; National Institute of Standards and Technology (NIST) Special Publication 800-63B<br \/>\n3. &#8220;Secure login methods for business accounts&#8221; &#8211; Ponemon Institute Study on Authentication Methods in Financial Services Sector<\/p>\n<table style=\"font-family: Arial, sans-serif; border-collapse: collapse; width: 100%;\">\n<caption>\n<h2><span class=\"ez-toc-section\" id=\"Key_Concepts_in_Multi-Factor_Authentication\"><\/span>Key Concepts in Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/caption>\n<tbody>\n<tr>\n<th style=\"background-color: lightgray; font-size: 16px; font-weight: bold;\">Concept<\/th>\n<th style=\"background-color: lightgray; font-size: 16px; font-weight: bold;\">Description<\/th>\n<\/tr>\n<tr>\n<td style=\"background-color: #f0f8ff;\">Multi-Factor Authentication<\/td>\n<td>Enhanced security method that requires users to provide multiple forms of verification before accessing a system<\/td>\n<\/tr>\n<tr>\n<td>Two-Step Verification<\/td>\n<td>Similar to multi-factor authentication, this method involves two separate authentication steps for added security<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #f0f8ff;\">Identity Verification<\/td>\n<td>Process of confirming an individual&#8217;s identity through various means such as biometrics or personal questions<\/td>\n<\/tr>\n<tr>\n<td>Physical Tokens<\/td>\n<td>Hardware devices that generate unique codes for authentication purposes<\/td>\n<\/tr>\n<tr>\n<td style=\"background-color: #f0f8ff;\">Authentication Apps<\/td>\n<td>Mobile applications that generate one-time passcodes for secure access<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q. What\u2019s the difference between MFA and 2FA?<br \/>\nA. \u200dMFA stands\u2064 for multi-factor authentication, and 2FA stands for two-factor\u200c authentication. With MFA, you use two or \u2064more authentication methods like a username\u2063 and password, a security token,\u2064 or a \u200bbiometric scan. \u2063With 2FA, you use two methods like a unique code sent to your phone or \u2063email, or a biometric scan. Both methods help keep your information secure.<\/p>\n<p>Q: What is the difference between MFA and 2FA?<\/p>\n<p>A: Multi-factor authentication (MFA) and two-factor authentication (2FA) are both forms of authentication that require users to provide more than one piece of evidence to verify their identity. While both MFA and 2FA provide additional layers of security beyond just a password, there is a key difference between the two.<\/p>\n<p>MFA requires users to provide multiple factors of authentication from different categories, such as possession factors (e.g., hardware tokens), knowledge factors (e.g., security questions), and inherence factors (e.g., biometric scans). On the other hand, 2FA only requires users to provide two distinct authentication factors, usually a combination of something they know (such as a password) and something they have (such as a hardware token).<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;NIST Special Publication 800-63,&#8221; National Institute of Standards and Technology<br \/>\n&#8211; &#8220;What is the difference between MFA and 2FA?&#8221; RSA Security<\/p>\n<p>Q: How do MFA and 2FA enhance security levels?<\/p>\n<p>A: Both MFA and 2FA provide additional security measures by adding extra layers of protection beyond just a password. By requiring users to provide multiple authentication factors, such as biometric verifications or SMS codes, these methods help verify user identity more effectively and reduce the risk of unauthorized access. This balance between security levels can help protect against brute force attacks, fraudulent access, and other security threats.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Enhancing Security Through MFA and 2FA,&#8221; Cybersecurity experts<br \/>\n&#8211; &#8220;Multi-Factor Authentication vs. Two-Factor Authentication,&#8221; Cybersecurity professionals<\/p>\n<p>Q: What are some common examples of additional authentication factors used in MFA and 2FA?<\/p>\n<p>A: Additional authentication factors used in MFA and 2FA can include biometric authentication factors (such as fingerprint scans or facial recognition), possession authentication factors (such as hardware tokens or security keys), and knowledge-based factors (such as security questions or SMS verification codes). These additional factors help enhance security posture and protect user identities in online services and remote access scenarios.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Common Authentication Factors in MFA and 2FA,&#8221; Business Rules<br \/>\n&#8211; &#8220;Types of Authentication Factors for MFA and 2FA,&#8221; Authentication requirements<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Your security\u200d is a top priority, so\u200b it is important to \u200cknow the\u200d difference between\u2062 MFA and 2FA. Consider taking the extra security step to protect your information\u2064 and create a FREE\u200d LogMeOnce account \u2013 the best two-factor authentication and\u2063 multi-factor authentication platform \u2013\u200d and <a href=\"https:\/\/logmeonce.com\/passwordless-qr-code-login\/\">stay safe online<\/a>. With <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a>, MFA and 2FA\u2019s \u2062difference will \u200bbecome clear and you\u200d will be able to reap the benefits of multifactor\u2063 authentication technology. So if you\u2019re still \u200dundecided about the \u2063difference\u2064 between MFA and 2FA, then look no further \u2013\u2062 LogMeOnce is the answer for all your \u2064security needs! Relevant\u2062 keywords: \u201cMFA vs 2FA\u201d, \u201cdifference between MFA and 2FA\u201d.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>\u200c Are \u200dyou aware of \u200bthe\u2063 two most popular authentication methods \u2063currently in use: Multifactor \u200cauthentication \u200b(MFA) and two-factor authentication (2FA)? Have you been asking yourself what is the difference \u200cbetween MFA and\u200c 2FA?\u2063 MFA, or Multifactor \u2062Authentication, provides \u2062more advanced security protection than\u2062 2FA, Two-Factor Authentication, making it\u2064 the more secure option. \u200bWith 2FA, [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1149,1294,11055,781,810,5875],"class_list":["post-69743","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-2fa","tag-authentication","tag-mfa","tag-security","tag-technology","tag-user-experience"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69743","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69743"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69743\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69743"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69743"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69743"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}