{"id":69832,"date":"2024-06-20T01:51:31","date_gmt":"2024-06-20T01:51:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/risk-based-multi-factor-authentication\/"},"modified":"2024-08-19T13:51:36","modified_gmt":"2024-08-19T13:51:36","slug":"risk-based-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/","title":{"rendered":"Enhance Your Security with Risk-Based Multi Factor Authentication: The Key to Ultimate Protection"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Modern technology has drastically changed the way\u2064 we use \u200dour \u2064computers\u2064 and mobile \u2064devices. As cyber threats\u200b become increasingly complex, businesses\u200c and\u200c organizations have to use more sophisticated\u2063 tools to\u200c protect their \u2062data. Risk Based Multi Factor Authentication\u200c (MFA) is one \u200csuch tool, providing\u2064 a \u2063powerful \u200byet secure \u2064way to authenticate\u200b users. By combining the advantages of multi-factor \u200dauthentication\u2063 with \u200bthe ability to \u2064assess risk levels based on user behavior, MFA \u200chelps to ensure\u200d business continuity by reducing\u2063 the \u200crisk of unauthorized access.\u2063 It also improves online security and \u200chelps to\u200c prevent fraudulent activities such as\u2062 identity theft, \u2064data \u200dbreaches and other \u200cmalicious activity. Furthermore, Risk Based\u200d MFA is\u200c an essential tool\u2062 for preventing \u200ddata leakage\u200d and securing\u200b customer data.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#1%E2%81%A3_Secure_Your_Account_with_Risk-Based%E2%81%A3_Multi-Factor_Authentication\" >1.\u2063 Secure Your Account with Risk-Based\u2063 Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#2_%E2%81%A3What%E2%80%8B_is_Risk-Based_%E2%81%A2Multi-Factor_Authentication\" >2. \u2063What\u200b is Risk-Based \u2062Multi-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#3_Ways_Multi-Factor_Authentication_Keeps_%E2%80%8DYour_%E2%81%A2Data_Safe\" >3. Ways Multi-Factor Authentication Keeps \u200dYour \u2062Data Safe<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#4_Why_Risk-Based_Multi-Factor%E2%81%A2_Authentication%E2%80%8D_is_Essential\" >4. Why Risk-Based Multi-Factor\u2062 Authentication\u200d is Essential?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#Authentication_Methods_Overview\" >Authentication Methods Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-secure-your-account-with-risk-based-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1%E2%81%A3_Secure_Your_Account_with_Risk-Based%E2%81%A3_Multi-Factor_Authentication\"><\/span>1.\u2063 Secure Your Account with Risk-Based\u2063 Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>It All\u2064 Starts with\u2063 Passwords<\/b><\/p>\n<p>Using\u2063 passwords to protect your accounts\u200d is essential, but \u2062passwords alone are unreliable and can easily compromised. Adding a\u200c second layer of authentication is a great way\u2062 to increase \u2064your security and protect your data. Risk-based multi-factor authentication (RMA) is a\u2064 type\u200c of authentication that uses more\u2064 than one factor to verify your identity, adding an extra layer of security.<\/p>\n<p><b>Benefits of \u200bRMA<\/b><\/p>\n<p>RMA \u2064is\u2064 beneficial on several levels: \u200b<\/p>\n<ul>\n<li>RMA requires authentication \u2064using multiple \u2064factors, increasing your security.<\/li>\n<li>RMA \u200dcan\u2062 identify and modify \u2062authentication based on user behavior \u2062and risk \u200banalysis.<\/li>\n<li>RMA monitors user activities\u200d and helps detect suspicious behavior\u2063 to protect your \u200ddata.<\/li>\n<li>RMA can be \u2064used in conjunction with strong\u200c passwords, monitoring systems, and access control measures.<\/li>\n<\/ul>\n<p>RMA is a great way to ensure \u2063the\u2064 safety of your data and minimize the risk\u200c of unauthorized access to your accounts.<\/p>\n<h2 id=\"2-what-is-risk-based-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_%E2%81%A3What%E2%80%8B_is_Risk-Based_%E2%81%A2Multi-Factor_Authentication\"><\/span>2. \u2063What\u200b is Risk-Based \u2062Multi-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Risk-Based Multi-Factor Authentication\u2064 (RB-MFA)<\/b> is an authentication method that combines\u2064 multiple\u200c authentication \u200dfactors to provide the highest level of security. It includes\u2064 two or more \u2063verification \u2064factors\u2062 that are evaluated\u200b simultaneously\u200c to determine \u2062whether the user is allowed \u2062access to a system,\u2062 application, or\u2063 data.<\/p>\n<p>RB-MFA can be used\u200d to secure online banking accounts, social media sites, medical records, and other sensitive\u2062 personal\u2062 information. It works\u2063 by combining\u2063 two or more \u2062authentication factors,\u2062 such as \u200ca \u2063password, \u200btext message \u200dor biometrics, in \u2064order to assess the risk associated with the user. \u2062Each factor is\u2064 assigned a risk score and the \u200coverall score\u200c is used \u2064to determine if the user is granted access.<\/p>\n<p>The\u2062 factors used in \u2063RB-MFA can differ \u200cdepending on the\u200b level of security\u200d required:<\/p>\n<ul>\n<li>Password: \u200bA user-generated password \u2063that must be\u200d entered correctly\u200d to gain\u2062 access.<\/li>\n<li>One-Time\/Two-Way Authentication Code: A code sent to\u200b a user\u2019s \u200dregistered device \u200cthat must \u200cbe input to properly\u200c log in.<\/li>\n<li>Biometrics:\u200d Fingerprints,\u2064 iris\u200c scans, voice recognition, and more used to authenticate a user\u2019s identity.<\/li>\n<\/ul>\n<p>Due \u200bto its reliance on multiple authentication factors, RB-MFA offers a higher level\u200c of \u2064security than traditional authentication\u200b methods, protecting sensitive data\u2062 from \u2063malicious actors. As a result, it\u200c is quickly \u200bbecoming\u200c the preferred authentication method for\u200c businesses across \u2063the globe.<\/p>\n<h2 id=\"3-ways-multi-factor-authentication-keeps-your-data-safe\"><span class=\"ez-toc-section\" id=\"3_Ways_Multi-Factor_Authentication_Keeps_%E2%80%8DYour_%E2%81%A2Data_Safe\"><\/span>3. Ways Multi-Factor Authentication Keeps \u200dYour \u2062Data Safe<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi-factor \u200bauthentication puts multiple layers of security\u2062 between \u2062your data and\u200d potential threats.<\/strong> It \u2062is growing in popularity as it offers companies \u2064a more reliable way of \u200bprotecting the sensitive information they manage. Here are \u200csome of the\u2064 <a href=\"https:\/\/logmeonce.com\/business-identity-management-identity-manager-and-access-manager\/business-pricing-and-comparison\/\">ways multi-factor authentication<\/a><a title=\"Risk Based Multi Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/risk-based-multi-factor-authentication\/\"> \u2064works<\/a>\u2062 to keep your data \u200csafe.<\/p>\n<ul>\n<li>It requires multiple methods \u200cof verifying your \u2063identity. A common setup involves using something you know (a\u2063 password), something you have (a \u200ctoken or \u2064device) and something you are (a biometric like a\u200c fingerprint).<\/li>\n<li>It\u2064 prevents \u200bunauthorized\u200c access by \u200bmaking it complex and difficult \u200cfor a hacker to\u2062 track \u200dand\u2064 identity you.<\/li>\n<li>It helps \u200censure that it is actually you that is attempting\u200b to \u2063access your account.<\/li>\n<li>It \u200bcan detect when sudden large-scale logins are occurring.<\/li>\n<li>It \u2062tracks\u2064 multiple\u200b login attempts and can notify you if there \u2062are multiple incorrect \u200cattempts, which could indicate a possible attack.<\/li>\n<\/ul>\n<p>Multi-factor authentication\u200d technologies can also\u2063 be used together with other \u2062security measures, such \u200cas firewalls, \u200cto provide an even greater level \u200bof security\u200c for your sensitive data. Two-factor authentication \u200bis becoming increasingly popular with large enterprises \u2064due to the additional level\u200d of \u200bsecurity the \u200dextra layer of\u2063 authentication\u2064 brings.<\/p>\n<h2 id=\"4-why-risk-based-multi-factor-authentication-is-essential\"><span class=\"ez-toc-section\" id=\"4_Why_Risk-Based_Multi-Factor%E2%81%A2_Authentication%E2%80%8D_is_Essential\"><\/span>4. Why Risk-Based Multi-Factor\u2062 Authentication\u200d is Essential?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Risk-based\u2063 authentication is a \u2064crucial part of the \u200bsecurity process for any business. It allows\u200d businesses to identify any potentially malicious users or activities and apply\u200d the right\u200b countermeasures\u200c to protect the\u200c user\u2019s data. Here are\u200c four reasons \u2062.<\/b><\/p>\n<ul>\n<li>Risk-based\u200d authentication eliminates \u200cweak passwords.\u200b Risk-based \u2064authentication leverages robust and\u2063 layered security measures, instead of relying on passwords\u2063 that can be easily guessed or\u2064 guessed \u2063in combination \u2064with other\u2064 factors.<\/li>\n<li>It improves data\u200c security. Risk-based authentication \u2062takes into \u2063account \u200ca range of factors when determining a user\u2019s identity and access to \u2063data, providing \u2064an enhanced layer of security.<\/li>\n<\/ul>\n<p>Risk-based authentication facilitates compliance with industry regulations \u200band guidelines. Regulatory requirements\u2063 for authentication and data security vary, and multi-factor\u200b authentication\u200c can help \u2063companies comply with applicable\u200c laws.<\/p>\n<p>Lastly, risk-based authentication is \u2064much more user-friendly than previous versions of authentication processes. It requires less\u2063 user input and minimizes the\u200c hassle associated with providing a second \u2064factor of \u2063authentication, allowing users to log in quickly and \u200csafely.<\/p>\n<p>Risk-Based Multi-Factor Authentication (MFA) is a critical component of ensuring secure access to systems and data, particularly in today&#8217;s digital landscape where cyber threats are becoming increasingly sophisticated. With the rise of mobile devices and the need for enhanced security measures, organizations are implementing multiple layers of authentication to verify user identities and protect against unauthorized access. This approach involves requiring users to provide additional credentials beyond just a password, such as biometric factors or security questions, to ensure that the correct individual is accessing the system. By utilizing adaptive authentication techniques, security teams can detect unusual behavior or unrecognized devices and prompt for a step-up authentication to verify the user&#8217;s identity. Duo&#8217;s Risk-Based Authentication solution, for example, leverages contextual information such as user location, IP address, and device attributes to assess the risk level of each authentication attempt and apply appropriate security measures. This dynamic approach not only enhances security but also provides a seamless user experience, reducing friction and improving customer satisfaction. Furthermore, continuous risk-based authentication allows organizations to continuously monitor user activity and adjust security policies based on risk potential and previous authentication behavior. By implementing a comprehensive authentication method policy that includes multiple factors and dynamic risk assessment, organizations can effectively mitigate security risks and protect against unauthorized access to corporate networks and online <a href=\"https:\/\/www.ibm.com\/topics\/data-breach\" target=\"_blank\" rel=\"noopener nofollow\">services<\/a>.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_Overview\"><\/span>Authentication Methods Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Definition<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Requires more than one verification method<\/td>\n<\/tr>\n<tr>\n<td>Facial Recognition<\/td>\n<td>Uses facial features for identification<\/td>\n<\/tr>\n<tr>\n<td>Dynamic Authentication<\/td>\n<td>Adjusts security levels based on risk<\/td>\n<\/tr>\n<tr>\n<td>Passwordless Authentication<\/td>\n<td>Does not require a password for access<\/td>\n<\/tr>\n<tr>\n<td>Risk-Based Remembered Devices<\/td>\n<td>Remembers trusted devices for easier access<\/td>\n<\/tr>\n<tr>\n<td>Continuous Authentication<\/td>\n<td>Constantly verifies user identity during session<\/td>\n<\/tr>\n<tr>\n<td>Adaptive Risk-Based Authentication<\/td>\n<td>Adjusts authentication based on risk levels<\/td>\n<\/tr>\n<tr>\n<td>Device Session Duration<\/td>\n<td>Duration time for device authentication<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q. What is Risk Based Multi Factor Authentication?<br \/>\nA. Risk Based Multi Factor Authentication is a way of keeping\u200c you safe when you use online accounts.\u200c It adds \u200dextra layers of security by verifying who you are before granting you access.\u200d<\/p>\n<p>Q. \u2062How does Risk Based Multi Factor Authentication work?<br \/>\nA. \u200bRisk Based Multi Factor\u200c Authentication \u2064requires \u2063at\u200d least two\u2062 steps\u2062 to verify who you are. These steps vary depending on \u2063the website but may\u2063 include things \u200dlike entering \u200ca password or using a fingerprint scan. This \u200dextra \u2064layer \u2063of protection helps keep your information secure from hackers.<\/p>\n<p>Q. Why is Risk \u200cBased \u2064Multi Factor \u200cAuthentication important?<br \/>\nA. Risk Based Multi Factor \u2062Authentication\u200d is important because \u200cit \u2062helps \u2063to keep your online\u2064 accounts and information secure. It\u200c also \u2063helps to\u2063 protect \u2063you\u200b from identity theft\u200d and online fraud.<\/p>\n<p>Q: What is Risk-Based Multi-Factor Authentication (MFA)?<\/p>\n<p>A: Risk-Based Multi-Factor Authentication (MFA) is a security solution that adds an extra layer of protection to the authentication process by requiring users to provide additional authentication factors beyond just a password. This method assesses the risk associated with each authentication request and dynamically determines the appropriate level of authentication based on various risk factors.<\/p>\n<p>Q: How does Risk-Based Authentication work?<\/p>\n<p>A: Risk-Based Authentication solutions analyze a wide range of factors, such as the level of risk associated with the authentication request, user behavior patterns, device reputation, location, and time of access requests. Low-risk users or familiar devices may experience a seamless authentication process with minimal additional layers, while suspicious activity or unfamiliar devices may trigger additional security measures.<\/p>\n<p>Q: What are the benefits of Risk-Based Multi-Factor Authentication?<\/p>\n<p>A: Risk-Based Multi-Factor Authentication enhances security by adapting the level of authentication required based on the perceived risk level, ensuring a more secure access process. This approach provides a seamless user experience for legitimate users while adding extra layers of protection for high-risk scenarios.<\/p>\n<p>Q: How does Risk-Based Multi-Factor Authentication improve user experience?<\/p>\n<p>A: Risk-Based Multi-Factor Authentication offers a seamless user experience by providing the right level of security based on risk factors without causing unnecessary friction for users. By continuously monitoring and adjusting the authentication process in real time, users can enjoy a secure and streamlined login experience.<\/p>\n<p>Q: What are some examples of risk factors that may trigger additional authentication steps in a Risk-Based Authentication system?<\/p>\n<p>A: Risk factors in a Risk-Based Authentication system include unfamiliar devices, suspicious activity, abnormal access attempts, anomalous authentication patterns, and unrecognized network locations. These factors may prompt the system to require extra steps, such as additional authentication challenges or verification links, to verify the user&#8217;s identity and prevent improper access.<\/p>\n<p>(Source: Duo Security &#8211; Risk-Based Authentication)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Concluding, Risk Based\u200d Multi Factor Authentication is increasingly\u200b becoming an\u200c important layer in the security armor of a user\u2019s digital identity. To implement this \u2063with utmost ease and reliability, <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> offers a FREE account\u200b that provides\u200b state-of-the-art\u200d security, with its Risk Based \u2063Multi Factor\u2064 Authentication Protocol. So why wait? Create\u2063 a FREE LogMeOnce account now and experience \u2063the\u2063 highest level of security \u200bwith \u2064Risk Based \u2062Multi Factor\u200c Authentication.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Modern technology has drastically changed the way\u2064 we use \u200dour \u2064computers\u2064 and mobile \u2064devices. As cyber threats\u200b become increasingly complex, businesses\u200c and\u200c organizations have to use more sophisticated\u2063 tools to\u200c protect their \u2062data. Risk Based Multi Factor Authentication\u200c (MFA) is one \u200csuch tool, providing\u2064 a \u2063powerful \u200byet secure \u2064way to authenticate\u200b users. By combining the [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[2009,1294,11188,7221,7104,872,5787,2979,9968,781],"class_list":["post-69832","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-digital","tag-authentication","tag-based","tag-compliance","tag-cyber","tag-financial","tag-fraud","tag-multi-factor","tag-risk","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69832","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69832"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69832\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69832"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69832"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69832"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}