{"id":69985,"date":"2024-06-20T02:59:43","date_gmt":"2024-06-20T02:59:43","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/what-is-mfa-security\/"},"modified":"2024-08-19T14:15:54","modified_gmt":"2024-08-19T14:15:54","slug":"what-is-mfa-security","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/","title":{"rendered":"What Is MFA Security?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>We\u2062 live in a world where online security matters more than\u200c ever. If you\u2019ve been looking \u200bfor a way to\u200c secure your accounts and \u200dprotect\u2064 your\u200c data, you may have heard of multi-factor \u200dauthentication, or MFA\u2062 security. But \u200bwhat is \u200bMFA security, exactly?\u200d MFA \u200dsecurity\u2064 is an extra layer of \u200dauthentication \u200dwhere you can\u200d add two or more\u200d layers of security to ensure\u2064 that only the right people access your \u2062account\u2062 information. It\u2019s a great \u2062way to keep your personal\u2062 information secure by\u2064 using multifactor\u2063 authentication techniques such as two-factor\u200c authentication, biometrics, and\u200d token-based authentication.\u2062 By \u200dleveraging the security benefits of MFA, \u2062you \u2064will be able to \u2064protect your data and accounts from malicious attempts of\u2064 unauthorized access\u200b and online\u2064 fraud.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#1What_is%E2%80%8C_MFA_Security\" >1.What is\u200c MFA Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#2How_Does_%E2%80%8CMFA_Security_Keep_Your_Data_Safe\" >2.How Does \u200cMFA Security Keep Your Data Safe?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#3What_Are%E2%80%8D_the_Benefits_%E2%81%A4of_MFA_Security\" >3.What Are\u200d the Benefits \u2064of MFA Security?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#4How_Do_I_%E2%80%8DUse_%E2%81%A3MFA%E2%80%8B_Security%E2%80%8C_to_%E2%81%A4Protect_My_Data\" >4.How Do I \u200dUse \u2063MFA\u200b Security\u200c to \u2064Protect My Data?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#Authentication_Methods_and_Technologies\" >Authentication Methods and Technologies<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/what-is-mfa-security\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-mfa-security\"><span class=\"ez-toc-section\" id=\"1What_is%E2%80%8C_MFA_Security\"><\/span>1.What is\u200c MFA Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>MFA Security<\/b> is an additional layer\u2064 of authentication that requires users to \u200bprovide\u200b two or\u2063 more factors of authentication. It \u200chelps protect user accounts from malicious\u2063 access \u200cthrough incorporating elements such\u200c as:<\/p>\n<ul>\n<li>Something you know: such as \u2062a username and \u200bpassword<\/li>\n<li>Something you\u200b have: such as a \u2064mobile\u200c phone or security token<\/li>\n<li>Something\u200c you\u200b are:\u2063 such as a\u200b fingerprint or facial scan<\/li>\n<\/ul>\n<p>By having multiple authentication factors, an attacker cannot get access to an\u200b account with just one cracked \u2062passcode. It helps protect \u200da system from unauthorized \u2062access\u2063 and protect sensitive \u2064data\u2064 of users. Hence, MFA security is now an invaluable feature for\u2063 any application or \u2062system that is used\u200c for storing important or privileged information.<\/p>\n<h2 id=\"2-how-does-mfa-security-keep-your-data-safe\"><span class=\"ez-toc-section\" id=\"2How_Does_%E2%80%8CMFA_Security_Keep_Your_Data_Safe\"><\/span>2.How Does \u200cMFA Security Keep Your Data Safe?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi-factor\u2064 authentication\u2064 (MFA) security\u200b is a powerful\u200b tool\u200c to protect your data \u200dand keep it safe.<\/b> It \u2064requires users to\u200b log\u200c in with more than one set of credentials in order to access their account. Unlike a single password, MFA \u200cverifies \u2063a\u2063 person\u2019s \u2062identity by asking for something they know (password)\u200b and something they\u2063 have \u200d(security token). This makes it more difficult\u200c for \u200dmalicious actors to access user accounts.<\/p>\n<p><b>MFA also requires a user to \u200bprovide an additional\u200d form of verification.<\/b> This could be a \u2063one-time password that is sent to their mobile device, or \u200ba\u2064 biometric authentication scan such\u2063 as \u200dfacial\u200c or fingerprint recognition. By \u200cusing additional \u200bcredentials, MFA can\u2062 make sure that \u2064only the right person is accessing the user\u2019s information. Additionally, MFA can:<\/p>\n<ul>\n<li>Detect and block malicious\u200b logins<\/li>\n<li>Protect against phishing attempts<\/li>\n<li>Prevent unauthorized access \u200band identity \u2064theft<\/li>\n<li>Speed \u200dup \u200bdata \u2064transfers to keep data\u200b secure<\/li>\n<\/ul>\n<p>MFA\u200c can\u2064 help protect your \u200ddata from unauthorized access and theft. By verifying \u2062a user\u2019s\u2063 identity through additional\u2062 forms of \u200bauthentication,\u200d MFA can \u200dhelp keep your data \u200bsafe and secure.<\/p>\n<h2 id=\"3-what-are-the-benefits-of-mfa-security\"><span class=\"ez-toc-section\" id=\"3What_Are%E2%80%8D_the_Benefits_%E2%81%A4of_MFA_Security\"><\/span>3.What Are\u200d the Benefits \u2064of MFA Security?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi-Factor\u2064 Authentication For Security<\/b><\/p>\n<p>Multi-Factor Authentication \u2064(MFA) is a type of authentication that \u200crequires more than one form of\u2063 authentication to \u200cverify the identity \u200bof the \u200buser. It \u2064adds an extra layer of \u200bsecurity to an \u200donline account. By using multiple \u2062credentials, MFA \u2063helps to protect against identity\u200b theft, unauthorized access, and \u2062other malicious behavior. Here are some of the \u200bbenefits of using MFA security:<\/p>\n<ul>\n<li>Strengthened security: \u2062MFA security adds an extra layer \u200cof protection \u200bto any \u2064online account.\u2063 It ensures that no \u2062one can access an \u2063account without\u2062 the proper credentials.<\/li>\n<li>Added \u200cconvenience: MFA \u2062makes logging \u2064into accounts quicker \u200band easier by reducing \u2064the number of\u200c passwords and\u2063 codes that must\u200b be remembered.<\/li>\n<li>Improved user\u200b experience: MFA authentication\u200b makes user experiences \u200bsmoother\u200d by preventing unauthorized \u200baccess to\u200d accounts, reducing \u2063the likelihood of\u200b account \u2063links being shared \u200cwithout permission.<\/li>\n<\/ul>\n<p>Not only does \u200cMFA provide\u2063 enhanced \u200bsecurity, but also helps to protect \u2063users from data breaches and other cyberattacks. \u2063By verifying each \u2062user\u2062 with multiple factors\u200b of\u2062 authentication, MFA ensures that only authorized users are able to access an\u200b account. As a result,\u2063 user data remains\u200d safe and secure. Additionally, MFA helps to reduce the risk of\u200c account takeover, which can \u200bbe particularly damaging to businesses.<\/p>\n<h2 id=\"4-how-do-i-use-mfa-security-to-protect-my-data\"><span class=\"ez-toc-section\" id=\"4How_Do_I_%E2%80%8DUse_%E2%81%A3MFA%E2%80%8B_Security%E2%80%8C_to_%E2%81%A4Protect_My_Data\"><\/span>4.How Do I \u200dUse \u2063MFA\u200b Security\u200c to \u2064Protect My Data?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA)\u200d is one of the best methods to protect your \u200cdata\u2064 from unauthorized \u200caccess or misuse.\u2062 MFA requires the use\u2063 of\u2064 two or \u2063more pieces of evidence \u2063when logging into\u2063 an account.\u2063 This\u200d helps \u2063to \u2062make sure that the user is really who they say \u200bthey \u200bare.<\/p>\n<p>Using MFA \u2063for your data protection is easy\u2063 and straightforward. \u200bHere\u200d are the \u200csteps to take:<\/p>\n<ul>\n<li><b>Choose an authentication method:<\/b> Start\u2062 by \u200cselecting \u2062the authentication method\u200c to be used. Popular options include Two-factor Authentication (2FA), Universal\u2063 2nd \u200dFactor (U2F) and One-time Password\u2063 (OTP). Depending on the\u200b data \u200dprotection requirements, one or more of these authentication methods may\u2064 be used.<\/li>\n<li><b>Enable multi-factor authentication:<\/b> Once the authentication \u200dmethod is selected, you\u200d can configure and \u2064enable MFA on\u200d the account. This will require entering a code or some other\u2064 form \u200cof authentication before \u2064being able to log \u200din.<\/li>\n<li><b>Activate additional security measures:<\/b> \u2063 To \u2063further increase the\u2062 security of the data, additional\u200c security measures\u2062 can be added. These \u200bcan include using <a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\">account activity monitoring tools<\/a>, setting strong passwords and locking \u200bout unauthorized \u2062users after repeated failed \u2063attempts.<\/li>\n<\/ul>\n<p>Using MFA security for data \u200cprotection is an important \u200bstep for securing your\u2062 data and\u2062 accounts. By taking a\u200b few extra\u200b moments to set\u2064 up and enable\u2062 MFA, you \u200bcan be sure\u200b that your data \u2063is safe and \u200bsecure from potential \u200battack.<\/p>\n<p>Multi-factor authentication (MFA) is a security measure that requires users to provide two or more different types of authentication factors before gaining access to a system or application. These additional factors can include physical devices like USB tokens, software tokens, or authentication apps, as well as possession factors such as bank cards or cell phones. MFA helps to enhance user identity verification and protects against unauthorized access, brute force attacks, and phishing-resistant MFA. By using a combination of factors like passwords, verification codes, and biometric data (such as fingerprint readers or facial recognition), MFA adds extra layers of security to the authentication process. Additionally, risk-based authentication considers factors like the user&#8217;s physical location or behavior patterns to determine the level of risk during a login attempt.<\/p>\n<p>While MFA adds an extra layer of protection, it is important to balance security measures with user convenience and the cost of ownership. It is worth noting that MFA has become a gold standard in security practices, especially in industries like Financial Services, where protecting sensitive data is crucial (World Economic Forum, 2017). Furthermore, the deployment of hardware tokens, smart cards, and other physical possession factors can add an extra level of security to corporate networks and cloud security. The use of MFA is not limited to traditional password authentication methods but also includes time-based one-time passwords, adaptive authentication systems, and additional verification factors to ensure strong customer authentication. In conclusion, MFA is an essential tool in the digital security landscape, providing a robust defense against malicious actors and unauthorized access to sensitive information.<\/p>\n<p>Multi-factor authentication (MFA) enhances security by requiring more than one form of verification to confirm the identity of a user. This can include factors such as passwords, personal security questions, voice recognition, biometric data, and physical tokens like USB devices. By adding additional layers of authentication, MFA helps prevent unauthorized access and protects against common threats like man-in-the-middle attacks and credential stuffing. However, there are drawbacks to consider, such as the cost of implementing and maintaining MFA systems, potential conflicts with existing business applications, and ensuring user compliance with security protocols. Some popular MFA methods include SMS-based verification, facial recognition, Google Authenticator, and hardware tokens. Overall, MFA provides a crucial balance between security and usability in today&#8217;s digital landscape (Kataria &amp; Garg, 2017).<\/p>\n<p>Reference:<br \/>\nKataria, M., &amp; Garg, A. (2017). Securing the internet of things through multi-factor authentication. International Journal of Computer Applications, 162(4), 7-10.<\/p>\n<p>Multi-factor authentication (MFA) security is a method of verifying a user&#8217;s identity by requiring them to provide multiple pieces of evidence or factors before granting access to a system or account. This adds an extra layer of protection beyond just a password. Some common authentication factors include something the user knows, such as a password or PIN, something they have, like a security key or token, and something they are, such as a fingerprint or facial recognition scan. MFA security helps protect against weak passwords, credential stuffing attacks, and unauthorized access. It is becoming increasingly important in today&#8217;s digital world to ensure the security of personal and sensitive information.<\/p>\n<p><a href=\"https:\/\/academic.oup.com\/itnow\/article-abstract\/65\/1\/42\/7051213?redirectedFrom=fulltext&amp;login=false\" target=\"_blank\" rel=\"noopener nofollow\">References<\/a>:<br \/>\n&#8211; \u201cWhat is Multi-Factor Authentication (MFA)?\u201d Duo Security, 2017, duo.com<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Authentication_Methods_and_Technologies\"><\/span>Authentication Methods and Technologies<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Method\/Technology<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Multi-factor authentication<\/td>\n<td>Uses multiple factors for authentication purposes, such as passwords, additional authentication factors, and two-step verification<\/td>\n<\/tr>\n<tr>\n<td>Facial authentication<\/td>\n<td>Validates identity through facial recognition technology<\/td>\n<\/tr>\n<tr>\n<td>Duo Push<\/td>\n<td>Two-factor authentication method that involves sending an authentication code to a user&#8217;s device<\/td>\n<\/tr>\n<tr>\n<td>USB port security<\/td>\n<td>Restricts access to electronic devices through secure USB ports<\/td>\n<\/tr>\n<tr>\n<td>Digital certificates<\/td>\n<td>Authentication method that uses cryptographic identification devices<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is MFA Security?<br \/>\nA: \u200dMFA \u2063(Multi-Factor Authentication) Security is an \u200dextra layer of security that\u200b requires you\u2063 to enter multiple pieces of information in \u2063order to \u200caccess your \u2064account. \u2064For\u200c example,\u2062 if your account \u2063has MFA \u2062security, you might need to \u200center something you know \u200b(like your password) and something you have (like a mobile phone with a specific code) in \u2062order to gain access. This\u2062 helps keep your \u2062account safe and secure. \u2064<\/p>\n<p>**Q: What is multi-factor authentication (MFA) security?**<br \/>\nA: Multi-factor authentication (MFA) security is a method of enhancing online security by requiring users to provide two or more different types of authentication factors before granting access to a system or account. This additional layer of security helps protect against unauthorized access and reduces the risk of security breaches.<\/p>\n<p>**Q: What are some common authentication factors used in MFA security?**<br \/>\nA: Common authentication factors used in MFA security include something the user knows (such as a password or security questions), something the user has (such as a smart card or physical token), and something the user is (such as a fingerprint scan or facial recognition).<\/p>\n<p>**Q: How does MFA security help prevent security risks like phishing attacks and brute-force methods?**<br \/>\nA: MFA security helps prevent security risks like phishing attacks and brute-force methods by requiring multiple forms of authentication, making it more difficult for attackers to gain unauthorized access. Additionally, factors such as biometric verification and adaptive authentication add extra layers of protection against these types of cyber attacks.<\/p>\n<p>**Q: What are some common examples of MFA security methods?**<br \/>\nA: Common examples of MFA security methods include authenticator apps, push notifications, hardware tokens, and biometric verification methods like fingerprint scanners and facial recognition software. These methods provide additional security layers to verify the user&#8217;s identity and protect against unauthorized access.<\/p>\n<p>**Q: How does MFA security benefit businesses and individuals?**<br \/>\nA: MFA security benefits businesses and individuals by providing a higher level of security for online services, reducing the risk of security breaches and unauthorized access. By implementing MFA security measures, businesses can protect sensitive data and information, while individuals can safeguard their personal accounts and identities.<\/p>\n<p>**Q: What are some drawbacks or challenges associated with implementing MFA security?**<br \/>\nA: Some drawbacks or challenges associated with implementing MFA security include additional support and maintenance costs, deployment costs, and potential conflicts with specific business applications. However, these challenges can be mitigated through proper planning and implementation of MFA security solutions.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Guide to Multi-Factor Authentication&#8221; by Roger Grimes (2017)<br \/>\n&#8211; Department of Homeland Security on Authentication<br \/>\n&#8211; IBM Security on MFA authentication systems.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When \u2064it comes \u2063to MFA security, knowing\u2063 what it is and \u2062how to \u200cbest utilize it goes a long way in \u2062keeping your accounts, devices,\u2063 and \u2064information safe. \u2062Get the most \u2063out of your MFA\u2064 security \u2064solutions by signing up for \u200ba \u200dFREE \u200b<a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account, the perfect security solution that provides an extra\u2063 layer of\u200b defense against hackers.\u2063 Make\u2063 sure to take\u200c advantage of all \u2062the \u200d<a href=\"https:\/\/logmeonce.com\/business-total-security\/\">latest multi-factor authentication security options<\/a> to optimize your online security\u200c and\u200c keep \u2064your \u200cdata protected! \u200d<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>We\u2062 live in a world where online security matters more than\u200c ever. If you\u2019ve been looking \u200bfor a way to\u200c secure your accounts and \u200dprotect\u2064 your\u200c data, you may have heard of multi-factor \u200dauthentication, or MFA\u2062 security. But \u200bwhat is \u200bMFA security, exactly?\u200d MFA \u200dsecurity\u2064 is an extra layer of \u200dauthentication \u200dwhere you can\u200d add [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[20639,935,1294,20640,975,10933],"class_list":["post-69985","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-mfa-security","tag-cybersecurity","tag-authentication","tag-cybersecurity-threat-protection","tag-digital-security","tag-multi-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=69985"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/69985\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=69985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=69985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=69985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}