{"id":70063,"date":"2024-06-20T03:11:31","date_gmt":"2024-06-20T03:11:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/what-is-the-purpose-of-multi-factor-authentication\/"},"modified":"2024-12-28T08:27:31","modified_gmt":"2024-12-28T08:27:31","slug":"what-is-the-purpose-of-multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/","title":{"rendered":"What Is The Purpose Of Multi Factor Authentication?"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Security is\u2063 a top priority for protecting digital data online. Multi Factor Authentication (MFA)\u200d is an important tool used to strengthen the security of our online accounts. It offers \u2062an additional layer of \u2064verification beyond a login password, and it\u2019s becoming increasingly important as the \u200cnumber of data breaches continues to rise. So, what is the\u2062 purpose of Multi Factor Authentication? This article will \u2063explore the role of MFA\u2064 in authenticating user identities, protecting against cyber threats, and\u2063 ensuring online security. Multi Factor\u2064 Authentication is necessary for \u2064secure access\u200b to online accounts, and by understanding its purpose, \u2064users can protect their data and remain \u200bsafe from malicious attackers.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#1_What_Is_%E2%81%A2Multi_Factor_Authentication\" >1. What Is \u2062Multi Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#2_Benefits_of_Multi_Factor_Authentication\" >2. Benefits of Multi Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#3_How_Multi_Factor_Authentication_%E2%80%8CWorks\" >3. How Multi Factor Authentication \u200cWorks?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#4_Get_Started_with%E2%81%A2_Multi_Factor_Authentication_Today\" >4. Get Started with\u2062 Multi Factor Authentication Today!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#Types_of_Multi-Factor_Authentication_Methods\" >Types of Multi-Factor Authentication Methods<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-multi-factor-authentication\" data-element-id=\"headingsMap-3-0\"><span class=\"ez-toc-section\" id=\"1_What_Is_%E2%81%A2Multi_Factor_Authentication\"><\/span>1. What Is \u2062Multi Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA)\u200b is a \u2062method of identity verification that requires multiple pieces of evidence to prove a user\u2019s identity. In addition to an email and password, a \u200cuser must provide a secondary piece of \u200didentification in\u2064 order to gain access to \u2062an \u2064account or a \u2064system.<\/p>\n<ul>\n<li><b>One-time PIN<\/b> \u200d is a \u2063code \u2063that is sent over SMS that a user needs to enter once to\u200b gain access.<\/li>\n<li><b>Biometric\u2064 scan<\/b> \u2063is a type of authentication that requires physical factors such\u200b as fingerprints,\u200c FaceID, or retinal scanning in order to \u200cgain \u2063access.<\/li>\n<li><b>Two-factor authentication<\/b> (2FA) is an MFA process that involves providing two \u200dpieces of identification,\u200b such as a password and a separate code sent to a device.<\/li>\n<\/ul>\n<p>MFA is a great \u2063way to protect systems and accounts, as \u200cit involves multiples layers of authentication that makes it harder for \u2062someone to gain access. It adds an extra layer of security, making it more difficult for hackers and other malicious actors to gain entry. Additionally,\u200c MFA offers user-friendly technology, such as biometric scanning, allowing users to\u200d quickly and easily authorize access to accounts.<\/p>\n<h2 id=\"2-benefits-of-multi-factor-authentication\" data-element-id=\"headingsMap-4-0\"><span class=\"ez-toc-section\" id=\"2_Benefits_of_Multi_Factor_Authentication\"><\/span>2. Benefits of Multi Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi factor authentication \u200dprovides an extra layer of security beyond traditional user name and password logins. It adds another layer to the authentication process\u2063 so\u200d that even if a user\u2019s login credentials are stolen, the attacker will still need to pass \u2062another authentication step. Here\u2019s a look at the major :<\/p>\n<ul>\n<li><b>Increased Security:<\/b> Without multi factor authentication,\u2062 user accounts are vulnerable \u200cto malicious attacks such as brute force and dictionary\u200b attacks. With this extra layer of security, it\u2019s much harder for attackers\u200c to access user accounts.<\/li>\n<li><b>Cost Savings:<\/b> With multi \u2064factor \u200dauthentication, companies \u200dcan save money. Since they are not paying for a more expensive single sign-on system, \u200cthey can invest that money elsewhere.<\/li>\n<\/ul>\n<p>Multi factor authentication provides an additional layer of\u2062 security, which can protect\u2064 companies from data breaches and other malicious cyber-attacks. And since it\u200c lowers \u2064the cost \u2063of security, it can \u2062help companies save\u2064 money \u200din the long run. It\u2019s an effective security\u200c measure \u2064that more and more organizations are turning to in order to keep their data safe.<\/p>\n<h2 id=\"3-how-multi-factor-authentication-works\" data-element-id=\"headingsMap-5-0\"><span class=\"ez-toc-section\" id=\"3_How_Multi_Factor_Authentication_%E2%80%8CWorks\"><\/span>3. How Multi Factor Authentication \u200cWorks?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA) is a security system used to \u200dprovide users with added protection for \u2062their online\u200d accounts and\u2062 transactions. It works \u200cby requiring an additional layer of authentication beyond what the user has \u200balready \u200dprovided.\u200d This secondary layer can be one or more elements such as:<\/p>\n<ul>\n<li>Something the user knows (e.g. a PIN or \u2064password)<\/li>\n<li>Something \u200cthe user has (e.g. a smartphone)<\/li>\n<li>Something the user is (e.g. biometric\u2063 characteristics)<\/li>\n<\/ul>\n<p>MFA provides a \u2063strong level of security, making it nearly impossible\u2063 for someone to access an online account or make a transaction without the \u200dproper authentication elements. Authentication\u200d is usually conducted in real-time \u2063and can be either predetermined\u2063 by the user or choose \u200dfrom a list of verified methods. Common authentication methods that can be used are email, text (SMS), dual-factor authentication (DFA), one-time-password (OTP), soft token, push notification, or biometric validation. The implementation of MFA ensures that no action can take place without first verifying\u200c the user\u2019s identity.<\/p>\n<h2 id=\"4-get-started-with-multi-factor-authentication-today\" data-element-id=\"headingsMap-6-0\"><span class=\"ez-toc-section\" id=\"4_Get_Started_with%E2%81%A2_Multi_Factor_Authentication_Today\"><\/span>4. Get Started with\u2062 Multi Factor Authentication Today!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication is an essential form of security in today\u2019s digital \u200cworld. Put simply, <a href=\"https:\/\/logmeonce.com\/enterprise-password-management\/\" data-abc=\"true\">multi-factor authentication adds<\/a> an\u2063 extra layer of security to protect your accounts from hackers. Here are four simple steps to get started:<\/p>\n<ul>\n<li><b>Choose your authentication method:<\/b> You \u2063will need to decide which authentication method is best for you. Common methods \u2064include SMS codes, one-time passwords, and biometric scans.<\/li>\n<li><b>Enroll in your chosen system:<\/b> Once you\u2019ve chosen your method, you will need to \u200benroll \u2064in your chosen system. Most systems require you to provide personal\u2063 information such as your email address and phone \u200cnumber.<\/li>\n<li><b>Verify your identity: <\/b>Verifying your \u2063account helps protect your data from malicious actors. Depending on your method, you\u2063 may need to provide a fingerprint, a scan of\u200d your photo identification, or type a \u2062code sent to you through SMS.<\/li>\n<li><b>Keep your Security credentials safe:<\/b> After \u2063you\u2019ve enrolled, you will be given a <a title=\"What Is The Purpose Of Multi Factor Authentication\" href=\"https:\/\/logmeonce.com\/resources\/what-is-the-purpose-of-multi-factor-authentication\/\" data-abc=\"true\">unique personal security code<\/a>. This\u200d code \u2062is the key to accessing your account, and it must be kept safe\u200b and secure at all times.\u2062<\/li>\n<\/ul>\n<p>Multi factor authentication can be\u2062 a vital tool in protecting your accounts from hackers, and takes only minutes to get started. Investing in multi-factor authentication is the best way to ensure\u200d that your data is protected and secure.<\/p>\n<p>Multi-factor authentication is a cybersecurity method that adds layers of security to the authentication process. This approach requires users to provide two or more verification factors, such as a password, biometric scan, or verification code sent to their mobile device. By using multiple factors of authentication, the security of the system is significantly increased, making it harder for unauthorized individuals to gain access. This extra security measure is particularly important in today&#8217;s digital landscape, where cyber threats are constantly evolving. Organizations that implement multi-factor authentication solutions can ensure that only authorized individuals have access to sensitive information, reducing the risk of data breaches and unauthorized access.<\/p>\n<p>Sources:<br \/>\n&#8211; &#8220;Multi-Factor Authentication&#8221; Department of Homeland Security, www.dhs.gov<br \/>\n&#8211; &#8220;Two-factor authentication&#8221; Download Data Security, 2017<\/p>\n<p>Multi-factor authentication is a form of authentication that requires multiple methods of verification in order to grant access to a system or account. This can include something you know (like a password or security question), something you have (like a mobile phone or authenticator app), and something you are (like a fingerprint or retina scan). By combining different authentication factors, multi-factor authentication significantly increases security levels compared to traditional single-factor authentication methods. The purpose of multi-factor authentication is to enhance security by adding extra layers of protection against unauthorized access, which is especially important in today&#8217;s digital age where cyber threats are becoming increasingly sophisticated. According to a study by Microsoft, multi-factor authentication can prevent 99.9% of account compromise attacks (Microsoft, 2017). By implementing multi-factor authentication, businesses and individuals can better protect their sensitive information and data from potential cyber attacks and security breaches.<\/p>\n<p>Multi-factor authentication (MFA) is a security measure that requires multiple forms of verification before granting access to a system or account. It goes beyond the traditional username and password combination to provide an additional layer of security. The purpose of MFA is to enhance authentication requirements and protect against unauthorized access. By incorporating factors such as physical location, possession factors (such as a physical device), and behavioral biometrics, MFA aims to prevent malicious actors from compromising sensitive information. This method helps to mitigate the risks of social engineering attacks and password breaches, adding an extra level of security to ensure only authorized users gain access. MFA provides a peace of mind for users and service providers, reducing the likelihood of damaging attacks. As technologies like artificial intelligence continue to advance, MFA becomes increasingly important in safeguarding personal and financial data. (Source: Microsoft Security Blog &#8211; &#8220;Two-factor authentication, additional authentication, authentication checks, authentication code, authentication for centuries, biometric authentication, drawback of authentication including&#8221; 2017)<\/p>\n<p><span style=\"font-size: 16px;\">Multi-factor authentication, also known as Multifactor Authentication, is a security measure that requires users to provide additional authentication factors beyond just a username and password. This extra layer of security helps protect sensitive information and provides greater certainty that the person attempting to access the account is who they claim to be. Some common examples of additional authentication factors include biometric traits such as fingerprint or facial recognition, possession factors like a physical card or token, and contextual factors such as the user&#8217;s location or behavior. This approach to authentication helps to prevent unauthorized access, especially in situations where passwords may be compromised, such as using public Wi-Fi networks in a coffee shop. Adaptive MFA further enhances security by adjusting the authentication requirements based on the user&#8217;s behavior or the perceived level of risk. Sources like the Federal Trade Commission and cybersecurity experts recommend implementing multi-factor authentication to protect against identity theft and unauthorized access to personal or financial accounts. Additionally, certain industries like banking and healthcare may be required to use stronger forms of authentication, such as India&#8217;s two-factor authentication requirement for credit card transactions. The deployment of hardware tokens, USB tokens, and biometric verification methods are essential components of a secure authentication mechanism, providing an added layer of protection against threats like business email compromise attacks or fraudulent transactions. Ultimately, the purpose of multi-factor authentication is to enhance security, protect sensitive data, and reduce the risk of unauthorized access to personal or corporate accounts.<\/span><\/p>\n<h2 data-element-id=\"headingsMap-7-0\"><span class=\"ez-toc-section\" id=\"Types_of_Multi-Factor_Authentication_Methods\"><\/span>Types of Multi-Factor Authentication Methods<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Authentication Method<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Multi-Factor Authentication<\/td>\n<td>Uses two or more security factors for verification (e.g., password and fingerprint)<\/td>\n<\/tr>\n<tr>\n<td>Voice Recognition<\/td>\n<td>Verifies identity through vocal patterns and characteristics<\/td>\n<\/tr>\n<tr>\n<td>Facial Authentication<\/td>\n<td>Authenticates users based on facial features and biometric data<\/td>\n<\/tr>\n<tr>\n<td>Biological Traits<\/td>\n<td>Utilizes unique biological characteristics (e.g., iris recognition) for authentication<\/td>\n<\/tr>\n<tr>\n<td>Token Products<\/td>\n<td>Hardware devices used to generate secure codes for authentication<\/td>\n<\/tr>\n<tr>\n<td>Facial Verification<\/td>\n<td>Confirms identity by comparing facial features with stored data<\/td>\n<\/tr>\n<tr>\n<td>Connected Tokens<\/td>\n<td>Devices linked to a network for authentication purposes<\/td>\n<\/tr>\n<tr>\n<td>Passwordless Authentication<\/td>\n<td>Authentication without the need for passwords, using alternative methods<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\" data-element-id=\"headingsMap-8-0\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What \u200cis Multi Factor Authentication (MFA)?<br \/>\nA: \u200bMulti\u200b Factor Authentication is a security process that helps protect online accounts from cybercriminals. It\u200d adds an extra layer of security by requiring more than just a password to \u2062access an account.<\/p>\n<p>Q: How does MFA work?<br \/>\nA: MFA works by requiring multiple pieces of identification, like a\u200c password, special code or physical item,\u2064 to authorize access. \u2063So if somebody tries to guess your password, they won\u2019t\u200d be able to get in with just that alone.<\/p>\n<p>Q: Why is MFA \u2062important?<br \/>\nA: MFA is important because it provides an extra layer of protection that is crucial for keeping your online accounts safe. It\u2064 prevents cybercriminals from being able to access information, accounts or systems.<\/p>\n<p>Q: What are the benefits of using \u200cMFA?<br \/>\nA: The main benefits of using MFA are increased\u2063 security, reduced risk of fraud, and improved \u2064user experience. It helps to keep your accounts safe and can help make sure that only authorized people are accessing your\u200c accounts.<\/p>\n<p>Q: What is Multi-Factor Authentication (MFA)?<br \/>\nA: Multi-Factor Authentication, also known as MFA, is a security measure that requires individuals to provide two or more verification factors to access a system or account. This adds an extra layer of security beyond just a username and password.<\/p>\n<p>Q: What are some common authentication factors used in MFA?<br \/>\nA: Common factors include something you know (like a password), something you have (like a physical token or smart card), and something you are (like a fingerprint scan or facial recognition).<\/p>\n<p>Q: How does MFA help prevent unauthorized access?<br \/>\nA: MFA helps prevent unauthorized access by requiring additional factors beyond just a password. This makes it more difficult for bad actors to gain access to sensitive information.<\/p>\n<p>Q: What are the benefits of using MFA?<br \/>\nA: MFA provides added security against unauthorized users, phishing attacks, and security breaches. It also helps protect against weak passwords and brute force attacks.<\/p>\n<p>Q: What is Risk-Based Authentication in relation to MFA?<br \/>\nA: Risk-Based Authentication is a form of MFA that assesses the risk level of a login attempt based on factors such as the time of day, geographic location, and the device being used. This helps determine if additional security measures are needed.<\/p>\n<p>Q: How does Adaptive Authentication work with MFA?<br \/>\nA: Adaptive Authentication is a form of MFA that adjusts security measures based on the individual user and the context of the authentication attempt. This helps provide the right level of security for each situation.<\/p>\n<p>Q: What are some common forms of MFA methods?<br \/>\nA: Some common forms of MFA methods include using hardware tokens, software tokens, SMS-based verification, biometric verification (such as facial or retinal scans), and Time-Based One-Time Passwords.<\/p>\n<p>Q: What industries benefit from using MFA?<br \/>\nA: Industries such as Financial Services, government agencies, and corporate networks benefit from using MFA to protect critical systems and sensitive data from unauthorized access.<\/p>\n<p>Q: How does MFA support digital transformation?<br \/>\nA: MFA supports digital transformation by providing an extra level of security for electronic authentication methods, helping to prevent hacking-related breaches and secure personal and corporate <a href=\"https:\/\/web.archive.org\/web\/20210406235123\/https:\/\/www.nist.gov\/itl\/applied-cybersecurity\/tig\/back-basics-multi-factor-authentication\" target=\"_blank\" rel=\"noopener nofollow\" data-abc=\"true\">data<\/a>.<\/p>\n<h2 id=\"outro\" data-element-id=\"headingsMap-9-0\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Creating\u2064 a \u2062secure online environment can be one of the \u2064most challenging tasks out there, but \u200cwith the help of Multi Factor Authentication, it\u2019s possible to keep your data safe. makes it easier with our free and secure online accounts. With our <a href=\"https:\/\/logmeonce.com\/password-manager\/\" data-abc=\"true\">multi-factor authentication technology<\/a>, you\u2019ll be\u2063 able to protect your \u2062accounts and data with an extra layer of security. Sign up for \u200c<a href=\"https:\/\/logmeonce.com\/\" data-abc=\"true\">LogMeOnce<\/a> today and experience the confidence of our multi-factor authentication, making it the perfect solution for your \u201cWhat\u200c is the purpose of Multi Factor Authentication\u201d needs.<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Security is\u2063 a top priority for protecting digital data online. Multi Factor Authentication (MFA)\u200d is an important tool used to strengthen the security of our online accounts. It offers \u2062an additional layer of \u2064verification beyond a login password, and it\u2019s becoming increasingly important as the \u200cnumber of data breaches continues to rise. So, what is [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,2071,19807,811,781],"class_list":["post-70063","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-data-protection","tag-multifactor-authentication","tag-online-safety","tag-security"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70063","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=70063"}],"version-history":[{"count":1,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70063\/revisions"}],"predecessor-version":[{"id":240593,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/70063\/revisions\/240593"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=70063"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=70063"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=70063"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}