{"id":71037,"date":"2024-06-20T07:54:38","date_gmt":"2024-06-20T07:54:38","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/mfa-zero-trust\/"},"modified":"2024-07-29T17:32:18","modified_gmt":"2024-07-29T17:32:18","slug":"mfa-zero-trust","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/","title":{"rendered":"MFA Zero Trust"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>We are\u200d living \u2063in a world\u2064 where cyber security is more\u200d important than ever. MFA Zero Trust\u2062 (Multi-Factor Authentication) \u200dis a new and innovative approach\u200d to guarding \u200dagainst cyber-security threats. It\u2019s a security strategy that adds \u2062a \u2063layer of protection \u200dto\u200d any organization by ensuring that only the right people access the\u200c right data at the right \u2062time. MFA Zero Trust requires users\u2062 to\u200c authenticate using \u200cmultiple factors, like \u200bpasswords, biometrics, or tokens, making it a\u200c much\u200b stronger security \u200dmeasure than traditional single-factor authentication methods. \u2063The key benefits of MFA Zero \u200dTrust are increased \u200bsecurity, better\u2062 user experience, and \u200dgreater \u200dcompliance with data protection \u2064regulations. With MFA\u200b Zero\u200b Trust, organizations can create \u200dsecure online environments \u2062and protect their digital assets from malicious \u2062attackers.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#1_What_%E2%81%A2is_MFA_Zero_Trust\" >1. What \u2062is MFA Zero Trust?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#2_%E2%81%A2Benefits_of_%E2%81%A2MFA_Zero_Trust_Security\" >2. \u2062Benefits of \u2062MFA Zero Trust Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#3%E2%81%A3_How_to_Implement_MFA_%E2%80%8BZero_Trust\" >3.\u2063 How to Implement MFA \u200bZero Trust<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#4_The_%E2%80%8CFuture%E2%81%A3_of_MFA_Zero_Trust_%E2%81%A2Security\" >4. The \u200cFuture\u2063 of MFA Zero Trust \u2062Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#Key_Benefits_of_MFA_Zero_Trust_Security\" >Key Benefits of MFA Zero Trust Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-mfa-zero-trust\"><span class=\"ez-toc-section\" id=\"1_What_%E2%81%A2is_MFA_Zero_Trust\"><\/span>1. What \u2062is MFA Zero Trust?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>MFA \u200cZero Trust provides\u200c an extra layer of security<\/strong><br \/>\nMultifactor Authentication (MFA) Zero Trust is a \u2062cybersecurity\u200c model\u2064 designed\u2064 to protect multiple\u2062 levels of access to an\u200d account \u2062or resource. This extra \u200dlayer of security uses authentication and \u200dauthorization processes \u200cto\u2063 verify \u200bindividuals and\u2063 devices that access and share data. This \u200cadvanced \u2064system supports both physical and virtual networks, including\u200b cloud-based systems, \u200censuring the \u200dmost\u2062 secure environment for data and resources.<\/p>\n<p><strong>Two-factor authentication increases\u2063 safety<\/strong><br \/>\nAt the heart of MFA Zero Trust is\u200b two-factor \u200cauthentication\u200c (2FA). 2FA requires the user to confirm \u200btheir identity using more\u2062 than one form \u2063of\u2063 evidence. For example, \u2063you may need \u200cto enter\u2062 a \u200cpassword before\u200d being sent a text message with a code.\u200c This adds an extra layer of protection \u2062to your \u2064account and makes it difficult for a cybercriminal to gain \u200daccess. Additionally, MFA Zero Trust helps keep identities \u2064and devices safe by constantly monitoring activity and granting\u2064 access only after\u2064 the user has passed authentication \u2063more than once.<\/p>\n<p>By incorporating MFA Zero \u200dTrust, organizations\u2063 are providing a stronger layer\u2063 of protection for their sensitive\u2063 data, and \u200da peace of mind to their customers.<\/p>\n<h2 id=\"2-benefits-of-mfa-zero-trust-security\"><span class=\"ez-toc-section\" id=\"2_%E2%81%A2Benefits_of_%E2%81%A2MFA_Zero_Trust_Security\"><\/span>2. \u2062Benefits of \u2062MFA Zero Trust Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Modern cyber threats are only getting savvier, and \u200dwhile traditional security measures, like passwords and two-factor authentication (2FA)\u2063 can provide \u200ba certain level of protection,\u200b they\u2019re not\u2062 always enough. Fortunately, Multi-Factor Authentication (MFA) zero\u200b trust\u2064 security offers an enhanced level of protection, providing advanced measures against cyber risks. \u2063To understand\u200b the benefits of this technology, let\u2019s take a closer\u200d look.<\/p>\n<p><b>Improved\u200d Security<\/b><\/p>\n<ul>\n<li style=\"list-style-type: none;\">\n<ul>\n<li>MFA\u2063 zero trust security provides better protection \u200dand verification\u2063 of user information, by integrating \u2062various authentication processes, like fingerprint sensors, facial recognition and biometrics. This improved security\u2064 is ideal for data and healthcare IT systems, financial services, government agencies\u2063 and\u200c organizations handling sensitive \u2062information.<\/li>\n<li>It also includes access \u2063control based on who the\u2063 user is, the device used, where the user is located and\u200d whether or not the user \u200dis\u2064 attempting\u2063 to access valid resources. Most importantly, it <a title=\"MFA Zero Trust\" href=\"https:\/\/logmeonce.com\/resources\/mfa-zero-trust\/\">helps reduce risk-related incidents<\/a>.<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p><b>Cost Efficient<\/b><\/p>\n<ul>\n<li>MFA\u200d zero trust security is\u2063 not only effective but \u200balso \u200ccost-effective in comparison to\u200b traditional security methods. It requires\u200d minimal investment to\u200c install, and does not require additional hardware or \u200bsoftware such as antivirus programs.<\/li>\n<li>By reducing the risk of potential\u2063 security breaches and hacks, not only do <a href=\"https:\/\/logmeonce.com\/how-secure-is-logmeonce\/\">businesses\u2062 save \u2063significant\u200c costs resulting<\/a> from data breaches, \u200cbut they also avoid the\u200b potential fines \u2064involved when in violation of the requirements established in organizations under the GDPR or HIPAA.<\/li>\n<\/ul>\n<h2 id=\"3-how-to-implement-mfa-zero-trust\"><span class=\"ez-toc-section\" id=\"3%E2%81%A3_How_to_Implement_MFA_%E2%80%8BZero_Trust\"><\/span>3.\u2063 How to Implement MFA \u200bZero Trust<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Target\u2062 keyword: \u2063MFA Zero\u200b Trust<\/p>\n<p>Multi-factor authentication \u2064(MFA) \u200bZero\u200c Trust is a security system involving verifying the identity of a user, often a computer user, by\u2064 using multiple layers\u2062 of authentication. Each layer helps to increase security and \u200dreduce the risk of unauthorized access. Here are \u200bthree \u2062tips for\u200b implementing MFA Zero Trust:<\/p>\n<ul>\n<li><strong>Choose the best \u2064authentication methods:<\/strong> You \u200bneed to \u200bchoose the best authentication methods\u2064 to\u200d protect\u200c your network \u2062from unauthorized access. \u200dThe \u200dinvestments you make in the right authentication\u2062 methods depend\u200c on the level of \u2063security\u200c you\u2062 want in your\u2064 environment and the amount of data you need\u200d to protect. Examples of methods\u2063 include biometric\u2064 authentication, password-based authentication, and\u200b two-factor authentication.<\/li>\n<li><strong>Utilize\u2062 security tools:<\/strong> Use the right security tools as a next layer\u2062 of protection for\u2063 controlling access. Prospective\u2064 security tools\u2064 can include access control lists (ACLs), intrusion detection systems \u2062(IDS), antivirus software, and more. Monitor and manage \u200cthese tools to ensure\u2062 your security measures are protecting your system.\u200b<\/li>\n<li><strong>Identify user roles:<\/strong> Different users should have different access, so it\u2019s important\u2064 to identify user roles\u2062 and \u200dto limit user\u2064 access as much as possible. This means having\u2062 different levels of access \u2064control based on \u200cusers\u2019\u2062 roles \u2064and responsibilities.\u2063<\/li>\n<\/ul>\n<p>By following the steps above, \u200dyou will be able\u2064 to successfully implement MFA\u2064 Zero Trust. This \u200dwill \u200bgive you the assurance\u200d that your system is \u2064secure from unauthorized access, \u2063giving you greater peace of mind.<\/p>\n<h2 id=\"4-the-future-of-mfa-zero-trust-security\"><span class=\"ez-toc-section\" id=\"4_The_%E2%80%8CFuture%E2%81%A3_of_MFA_Zero_Trust_%E2%81%A2Security\"><\/span>4. The \u200cFuture\u2063 of MFA Zero Trust \u2062Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>As organizations increasingly move to remote working \u200denvironments, the advent of Zero \u200cTrust security is becoming more important than ever. MFA Zero Trust Security is a\u200c rapidly developing technology that \u2063provides organizations with\u200d enhanced security protocols that\u200b are \u2064difficult to breach. With the potential to eradicate a host of security \u200dweaknesses, MFA\u200b Zero Trust Security is currently the \u200bmost reliable method of protecting an organization\u2019s data.<\/p>\n<p>looks brighter than \u2064ever, \u2062as \u200btechnology advances quickly. Here \u2063are\u2063 some ways it is being used\u200c in the present:<\/p>\n<ul>\n<li><b>Two-factor \u200cauthentication:<\/b> Zero \u2062Trust Security requires organizations \u2064to use two-factor authentication (2FA). 2FA requires them\u2062 to provide two \u2063distinct \u2062factors when logs in, such as a username and password, or a physical \u200dtoken and a PIN.<\/li>\n<li><b>Adaptive access control:<\/b> \u200cMFA Zero Trust Security also offers the opportunity\u200d to use adaptive access control tools. These \u2063tools allow organizations\u2064 to\u200d control access to their networks and\u2062 programs\u200c primarily \u200con\u2062 the user\u2019s role \u200bor their level\u200b of need.<\/li>\n<li><b>Single\u2063 Sign-On:<\/b> \u200bOne of the most appealing aspects \u2062of MFA Zero Trust\u200b Security is its ability to\u2063 provide users access\u200b to \u2062all of their \u2062information\u200c or programs from one-single website through a process called single sign-on (SSO). This eliminates the need for multiple logins.<\/li>\n<\/ul>\n<p>As organizations benefit \u200cfrom the increased \u2064security provided by MFA\u2062 Zero Trust Security, \u200dthe technology is sure \u2062to continue to become a\u2064 standard part of most security protocols. \u200cMFA\u200b Zero Trust Security\u200c ensures that organizations remain \u200dsecure \u200cand their \u2063data protected for years\u2063 to come.<\/p>\n<p>MFA Zero Trust is a security model that focuses on minimizing the attack surface by implementing Multi-factor Authentication (MFA) for access to applications and resources. This security architecture emphasizes continuous monitoring and strict identity verification to combat potential threats. The trust strategy employs risk assessments, smart cards, and least-privilege access to mitigate risk levels. Trust policies and risk-based authentication are core principles in establishing a zero-trust environment.<\/p>\n<p>With the increase in remote workforce due to the COVID-19 pandemic, organizations are adopting Conditional Access and strong authentication systems to protect against phishing attacks and credential-based attacks. The use of artificial intelligence and cloud-based solutions has become essential in balancing security and user experience in the cybersecurity landscape. To ensure trust in user identity, organizations are implementing trust solutions such as Continuous authentication and device access protection. This approach to network security is crucial for protecting network resources and critical assets from cybersecurity threats. Sources: (Microsoft Zero Trust Security, Gartner Zero Trust Networking, NIST Zero Trust Architecture)<\/p>\n<p>In today&#8217;s cybersecurity landscape, organizations face a myriad of threats to their network perimeters and access to applications and resources. Attack vectors such as phishing attacks, credential-based attacks, and malicious actors constantly test the security model of companies, making it crucial for businesses to implement robust security architecture to protect user identity and corporate networks. This is where Multi-Factor Authentication (MFA) Zero Trust comes into play as a trust strategy that prioritizes strict identity verification and risk assessments to limit trust and prevent potential threats from compromising organization data.<\/p>\n<p>One of the core principles of MFA Zero Trust is the Trust Model, which establishes trust policies and risk-based authentication to determine the level of access users have to network resources. By implementing multifactor authentication, organizations can ensure that users must provide multiple verification factors, such as smart cards or biometric verification, before gaining access to critical resources. This authentication process not only strengthens security but also provides continuous monitoring to detect and respond to any suspicious activity in real-time.<\/p>\n<p>Additionally, the Trust Network Access in MFA Zero Trust allows <a href=\"https:\/\/www.cisco.com\/c\/en\/us\/products\/security\/zero-trust-workshops.html\" target=\"_blank\" rel=\"noopener nofollow\">organizations<\/a> to create trust policies that grant access based on trust factors, such as device access protection and continuous authentication. With the trust security architecture and framework in place, organizations can manage access to company resources securely and efficiently while balancing between security and satisfactory user experience. This approach to network security is especially vital in the current cybersecurity landscape, where remote workforce concerns and compliance standards must be met to protect against cybersecurity threats and breaches.<\/p>\n<p>To further enhance security, organizations can implement Conditional Access in MFA Zero Trust, which sets rules based on the risk level of users and devices to control access to applications. By enforcing least-privilege access and limiting trust to only authorized users, organizations can mitigate the risk of lateral movement and unauthorized access to critical resources. Additionally, continuous monitoring capabilities provide insight into endpoint security hygiene and ensure that access policies are up-to-date to meet compliance frameworks and protect against cybersecurity threats.<\/p>\n<p>In light of the COVID-19 pandemic, many organizations have transitioned to remote work environments, making it even more critical to establish a zero-trust architecture that secures application access and network perimeters. By leveraging artificial intelligence and cloud-based solutions, organizations can adapt to the changing cybersecurity landscape and protect against bad actors seeking to exploit vulnerabilities in legacy applications. With the right technology for trust decisions and a balance between security and user workflow, organizations can establish a secure trust architecture that safeguards user identity and network resources in the face of evolving cybersecurity threats.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Key_Benefits_of_MFA_Zero_Trust_Security\"><\/span>Key Benefits of MFA Zero Trust Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefit<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Improved Security<\/td>\n<td>MFA Zero Trust provides better protection and verification of user information by integrating various authentication processes like biometrics and facial recognition.<\/td>\n<\/tr>\n<tr>\n<td>Cost Efficient<\/td>\n<td>MFA Zero Trust is cost-effective compared to traditional security methods, reducing the risk of security breaches and potential fines.<\/td>\n<\/tr>\n<tr>\n<td>Two-factor Authentication<\/td>\n<td>MFA Zero Trust requires organizations to use two-factor authentication (2FA) to provide two distinct factors for user login, enhancing security.<\/td>\n<\/tr>\n<tr>\n<td>Adaptive Access Control<\/td>\n<td>MFA Zero Trust allows organizations to use adaptive access control tools to control access based on the user&#8217;s role and level of need.<\/td>\n<\/tr>\n<tr>\n<td>Single Sign-On<\/td>\n<td>MFA Zero Trust enables single sign-on (SSO), providing users access to all their information from one website, eliminating the need for multiple logins.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is MFA Zero Trust?<br \/>\nA: MFA Zero Trust is a security model that requires strict identity verification for access to applications and resources, even within the corporate network. It aims to minimize the attack surface and potential threat by continuously monitoring user identity and access requests. (Source: csoonline.com)<\/p>\n<p>Q: How does MFA Zero Trust improve security architecture?<br \/>\nA: MFA Zero Trust enhances security architecture by implementing multifactor authentication and risk-based authentication processes, ensuring that only authenticated users with least-privilege access can access resources. This approach helps mitigate credential-based attacks and phishing attacks.<\/p>\n<p>(Source: techtarget.com)<\/p>\n<p>Q: What is the significance of Continuous monitoring in the Zero Trust Model?<br \/>\nA: Continuous monitoring plays a crucial role in the Zero Trust Model by providing real-time visibility into network traffic and detecting potential threats or suspicious activities. It helps in maintaining a secure access environment and preventing unauthorized access by bad actors. (Source: blackberry.com)<\/p>\n<p>Q: How does MFA Zero Trust benefit remote workforce and compliance standards?<br \/>\nA: MFA Zero Trust enables secure access for remote workforce by implementing strict authentication requirements and conditional access policies. It helps organizations comply with cybersecurity standards and protect critical resources from cybersecurity threats, even with employees using unmanaged devices outside the corporate network. (Source: forbes.com)<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Looking for enhanced protection for your data with MFA Zero Trust? Sign up for a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account for a secure, stress-free experience. LogMeOnce offers a comprehensive range of multi-factor authentication (MFA) and zero trust security solutions to help organizations stay protected. Discover why MFA Zero Trust is a crucial element in providing defense-grade data protection for companies worldwide. Get started now and secure your data with LogMeOnce\u2014sign up for your free account today!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>We are\u200d living \u2063in a world\u2064 where cyber security is more\u200d important than ever. MFA Zero Trust\u2062 (Multi-Factor Authentication) \u200dis a new and innovative approach\u200d to guarding \u200dagainst cyber-security threats. It\u2019s a security strategy that adds \u2062a \u2063layer of protection \u200dto\u200d any organization by ensuring that only the right people access the\u200c right data at [&hellip;]<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[20943,11992,935,12235,1488,1302,16829,20944],"class_list":["post-71037","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-closing-the-door-on-cyber-security-risks-mfa","tag-cybersafety","tag-cybersecurity","tag-cyberthreats","tag-dataprotection","tag-datasecurity","tag-riskmanagement","tag-zerotrust"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71037","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=71037"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71037\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=71037"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=71037"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=71037"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}