{"id":71684,"date":"2024-06-20T10:54:31","date_gmt":"2024-06-20T10:54:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/13\/multi-factor-authentication-something-you-are\/"},"modified":"2024-08-06T20:14:10","modified_gmt":"2024-08-06T20:14:10","slug":"multi-factor-authentication-something-you-are","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/","title":{"rendered":"Multi Factor Authentication Something You Are"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Multi\u200d Factor Authentication Something\u2062 You Are is an important security measure that helps protect \u200byour online\u200b identity \u200cand secure your\u200b sensitive \u200cdata. It\u200d ensures that you are indeed\u2063 the rightful user\u2062 by authenticating your identity using a combination\u2063 of factors.\u2064 The main factor \u200cused is\u2063 either something you \u200bknow,\u2063 something you have,\u200d or something you are. This\u2062 last option, \u201cSomething You Are\u201d, is often considered \u200dthe most \u200dsecure, as \u200cit requires biometric authentication. \u2062With multi\u200b factor \u2064authentication, your \u200donline activities are \u2064better \u200bprotected from fraudsters and hackers. \u200bIt\u200b has become increasingly important\u200c as technology advances\u200c and \u2063online security \u200bthreats become increasingly sophisticated and prevalent. For companies, multi factor authentication \u200cwith something you are is an effective way to \u200cprotect sensitive \u2063customer data and \u200cassure customers of \u2064the\u2064 security of their personal \u2062information.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#1_%E2%81%A3What_Is_Multi-Factor_Authentication_Something_You_Are\" >1. \u2063What Is Multi-Factor Authentication Something You Are?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#2_%E2%80%8CUnderstanding_How_Multi-Factor_%E2%81%A2Authentication_Something_You_Are_Keeps%E2%81%A4_You_Secure\" >2. \u200cUnderstanding How Multi-Factor \u2062Authentication Something You Are Keeps\u2064 You Secure<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#3_Benefits_of_%E2%81%A3Using_Multi-Factor_%E2%80%8BAuthentication_%E2%81%A4Something_%E2%80%8DYou_Are\" >3. Benefits of \u2063Using Multi-Factor \u200bAuthentication \u2064Something \u200dYou Are<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#4_Get_Started_with_Multi-Factor_Authentication_Something_You_Are_Today\" >4. Get Started with Multi-Factor Authentication Something You Are Today!<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#Benefits_of_Multi-Factor_Authentication_Something_You_Are\" >Benefits of Multi-Factor Authentication Something You Are<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-multi-factor-authentication-something-you-are\"><span class=\"ez-toc-section\" id=\"1_%E2%81%A3What_Is_Multi-Factor_Authentication_Something_You_Are\"><\/span>1. \u2063What Is Multi-Factor Authentication Something You Are?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi-Factor\u2063 Authentication \u200bis a security \u200cmeasure<\/b> that \u200crequires more than \u200cjust a single form of identification to gain access. It combines two different components, a\u2063 <b>password and \u200da \u2064second factor,<\/b> \u200bsuch \u2062as a cell\u2063 phone\u200d or \u2062a biometric like\u2063 a fingerprint.<\/p>\n<p>This added step helps\u2062 to verify \u200cthat users are who they claim to be. It \u2064also provides\u200c an extra layer of\u200d security\u2062 to ensure\u2064 that even if someone somehow gains access to\u2062 your password, they will still be unable access\u200c your account.<\/p>\n<p><b>Advantages of Multi-Factor Authentication<\/b><\/p>\n<ul>\n<li>Enhanced security measure, making it harder \u200cfor \u200dhackers \u2063to \u200bbreak into \u2062your accounts<\/li>\n<li>Identity verification step, eliminating \u200cthe risk\u200c of\u2062 unauthorized access<\/li>\n<li>Effortlessly adds an \u200cadditional \u200clayer of\u2062 security<\/li>\n<li>User friendly and fast sign-in\u200c process<\/li>\n<\/ul>\n<p>Multi-factor authentication is\u200c a simple,\u200d yet effective \u2064way to safeguard \u2064your accounts and keeps your data and information \u200bsafe.<\/p>\n<h2 id=\"2-understanding-how-multi-factor-authentication-something-you-are-keeps-you-secure\"><span class=\"ez-toc-section\" id=\"2_%E2%80%8CUnderstanding_How_Multi-Factor_%E2%81%A2Authentication_Something_You_Are_Keeps%E2%81%A4_You_Secure\"><\/span>2. \u200cUnderstanding How Multi-Factor \u2062Authentication Something You Are Keeps\u2064 You Secure<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>What is Multi-Factor Authentication?<\/b><\/p>\n<p>Multi-Factor \u2064Authentication (MFA)\u2063 is an extra layer \u2062of security designed to protect your accounts from malicious\u200b attempts at access. It\u2063 is used \u200dto verify your identity when you \u200dmake changes or access your \u200caccount. This additional layer of security ensures that anyone \u200cwho attempts\u2062 to login or make changes\u2063 to your account is really you.<\/p>\n<p><b>Understanding\u200b How MFA Keeps You Secure<\/b><\/p>\n<p>MFA works\u200b to secure your\u200b accounts by validating\u200d your \u2062identity using a\u2064 combination of three\u2062 authentication\u2062 methods: something you know, something \u2063you have, and something you are.<\/p>\n<ul>\n<li>Something you know: typically\u2062 a password, PIN,\u200c or\u2064 phrase.<\/li>\n<li>Something you have:\u200b a device \u200blike your \u2063phone, a USB security token, or an authentication app.<\/li>\n<li>Something you \u200care: usually \u2063a biometric piece\u2063 of identification like a fingerprint, voice print, \u200dfacial recognition, or retinal scan.<\/li>\n<\/ul>\n<p>When you attempt to log into your account, you must fulfill each of the three authentication \u200bmethods before being granted access. \u200dThis <a href=\"https:\/\/logmeonce.com\/free-mobile-security\/\">added \u200dsecurity layer helps protect data<\/a> and\u2063 accounts from malicious intrusions and ensures that you\u2019re the only one \u200dwith access to your information.<\/p>\n<h2 id=\"3-benefits-of-using-multi-factor-authentication-something-you-are\"><span class=\"ez-toc-section\" id=\"3_Benefits_of_%E2%81%A3Using_Multi-Factor_%E2%80%8BAuthentication_%E2%81%A4Something_%E2%80%8DYou_Are\"><\/span>3. Benefits of \u2063Using Multi-Factor \u200bAuthentication \u2064Something \u200dYou Are<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>\u200d Multi-Factor Authentication \u200bis an important layer of security\u2064 in today\u2019s online world. With Something You Are \u200bauthentication,\u200d an additional layer of \u2063security is added\u200d to strengthen\u2064 your security\u200b system.<\/p>\n<p>Here \u200care some of\u2064 the benefits of using Something You Are authentication:<\/p>\n<ul>\n<li><b>Reliability:<\/b> Something \u2062You Are authentication relies on biometrics, which are harder to spoof or duplicate, making it easier to detect fraud\u2064 than\u200d traditional \u2063authentication methods.<\/li>\n<li><b>Ease of Use:<\/b> Something\u2063 You Are authentication doesn\u2019t\u2062 require any extra logins \u2062or\u2063 authentication steps, \u200cmaking\u2062 it \u200ceasier to use for users.<\/li>\n<li><b>Increased\u2064 Security:<\/b> Multi-factor authentication \u200bis essential \u200dfor protecting sensitive data. Something \u200cYou Are authentication adds an \u2063additional\u200d layer of\u2063 security \u2064to ensure the safety and integrity of the data.<\/li>\n<\/ul>\n<p>Something You Are authentication \u200cis a \u2064great addition to\u2064 any security\u2064 system,\u2064 offering increased reliability and ease of \u200buse with its additional layer of \u2063security.<\/p>\n<h2 id=\"4-get-started-with-multi-factor-authentication-something-you-are-today\"><span class=\"ez-toc-section\" id=\"4_Get_Started_with_Multi-Factor_Authentication_Something_You_Are_Today\"><\/span>4. Get Started with Multi-Factor Authentication Something You Are Today!<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication\u200b (MFA) is an\u200d authentication method used to add \u200dan \u2063extra layer of\u2063 security for your online accounts. It \u2062requires more than \u200cone\u2064 form of identification from the user, so it \u2064becomes much harder for potential hackers to gain\u200c access. The most common approaches used\u2062 for MFA are <b>something you know<\/b>, <b>something you have<\/b>, \u2063and <b>something you\u200d are<\/b>,\u2064 so \u200clet\u2019s focus on the \u200bthird\u200b one \u200cfor this post.<\/p>\n<p>Using <b>something you are<\/b> is\u200d one of\u2063 the most widely used \u2063and effective forms of MFA. It generally involves \u200cusing\u200d biometric\u200b factors such as\u200b fingerprint,\u2063 facial recognition, voice recognition, etc. Some examples of \u2064applications where MFA utilizing\u2064 <b>something\u200d you are<\/b> are employed:<\/p>\n<ul>\n<li>Checking bank account<\/li>\n<li>Making purchases \u200conline<\/li>\n<li>Logging\u200d in\u200c to certain \u2062applications<\/li>\n<li>Accessing \u200dsensitive information<\/li>\n<\/ul>\n<p>As you can see, using biometrics for\u200b MFA is becoming \u2064more popular. The process\u2063 is \u200bpretty simple, \u2064you \u200djust\u2062 need to select the authentication factor you want and \u2062then enter the details associated with it, such\u2063 as your fingerprint or face. This adds an extra security layer to keep your information \u2064safe.<\/p>\n<p>Multi-factor authentication (MFA) is a form of authentication that requires individuals to provide two or more different factors of authentication before gaining access to a system. These factors can include something you know, such as a password or security question, something you have, such as a smart card or token, or something you are, such as a fingerprint scan or iris scan. MFA adds an additional layer of security to the login process, reducing the risk of unauthorized access by bad actors.<\/p>\n<p>Common methods of MFA include using a combination of factors such as a credit card and a security question, or a fingerprint scan and a mobile device authentication technique. By using multiple factors to verify identity, MFA helps to mitigate security risks and protect sensitive information from cyber threats. Organizations can implement MFA to enhance security measures and safeguard their networks from potential attacks. Sources: NIST Special Publication 800-63B, NIST Special Publication 800-63-3.<\/p>\n<p>In today&#8217;s digital world, where cyber threats are constantly evolving, it is vital to have robust security measures in place to protect sensitive information and personal data. One such security measure is Multi-Factor Authentication (MFA), also known as Two-Factor <a href=\"https:\/\/doi.org\/10.6028\/NIST.SP.1800-27\" target=\"_blank\" rel=\"noopener nofollow\">Authentication<\/a> (2FA). MFA is a form of authentication that requires users to provide two or more verification factors before granting access to a system or account. These verification factors typically fall into three categories: something you know (such as a password or PIN), something you have (such as a smart card or mobile device), and something you are (such as a fingerprint scan or iris scan).<\/p>\n<p>Possession Factor Authentication: One common factor in authentication is the possession factor, which involves something the user possesses, such as a smart card or mobile device. This additional verification factor adds an extra layer of security to the authentication process by requiring the user to physically possess a specific item in order to access their account. For example, a user may be required to insert a smart card into a smart card reader or enter a one-time code sent to their mobile phone in addition to entering their password. By combining the possession factor with other authentication factors, such as knowledge factors or biometric factors, MFA provides a more secure authentication process that is less vulnerable to unauthorized access.<\/p>\n<p>Inherence Factor Authentication: Another factor in authentication is the inherence factor, which involves something inherent to the user, such as a fingerprint or iris scan. Biometric verification methods are becoming increasingly popular as a form of authentication due to their high level of security and convenience. Biometric systems can verify a user&#8217;s identity based on unique biological traits, such as fingerprints, iris patterns, or facial recognition. By using biometric methods in conjunction with other verification factors, such as possession factors or knowledge factors, MFA enhances security by adding an extra layer of protection against unauthorized access.<\/p>\n<p>Authorization Process: In addition to the verification factors used in the authentication process, the authorization process plays a crucial role in ensuring secure access to systems and accounts. Authorization parameters, such as access rights and permissions, define what actions a user is allowed to perform once they have been successfully authenticated. By implementing strong authorization processes, organizations can mitigate the risk of misuse and unauthorized access to sensitive data. For example, remote workers may have restricted access to certain systems or networks based on their role within the organization, while administrators may have full access rights to all systems and accounts. By defining clear authorization parameters and enforcing strict access controls, organizations can reduce the risk of security breaches and protect sensitive information from malicious actors.<\/p>\n<p>Overall, Multi-Factor Authentication (MFA) is a critical security measure that enhances the authentication process by requiring users to provide multiple verification factors before granting access to a system or account. By combining different types of authentication factors, such as possession factors, inherence factors, and knowledge factors, MFA provides a layered approach to security that is more resilient to cyber threats and unauthorized access. Through strong authorization processes and access controls, organizations can ensure secure access to systems and accounts, protecting sensitive data from malicious actors and cyber criminals. With the increasing prevalence of cyber attacks and security risks, implementing modern Multi-Factor Authentication techniques is essential to safeguarding digital accounts, corporate networks, and private information.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Multi-Factor_Authentication_Something_You_Are\"><\/span>Benefits of Multi-Factor Authentication Something You Are<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Reliability<\/td>\n<td>Biometrics are harder to spoof, enhancing security<\/td>\n<\/tr>\n<tr>\n<td>Ease of Use<\/td>\n<td>No extra logins, user-friendly<\/td>\n<\/tr>\n<tr>\n<td>Increased Security<\/td>\n<td>Essential for protecting sensitive data<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is Multi Factor Authentication?<br \/>\nA: Multi Factor Authentication, also known as Two-factor authentication or Multi &#8211; Factor Authentication, is a form of authentication that requires users to provide two or more verification factors before gaining access to a system or application. These factors can include something you know (such as a password or security question), something you have (such as a smart card or mobile device), or something you are (such as a fingerprint scan or iris scan).<\/p>\n<p>Q: What are some common authentication factors used in Multi Factor Authentication?<br \/>\nA: Common authentication factors used in Multi Factor Authentication include passwords, physical tokens (such as smart cards or hardware tokens), biometric verification methods (such as fingerprints or iris scans), and additional verification factors like SMS tokens or security questions.<\/p>\n<p>Q: How does Multi Factor Authentication enhance security?<br \/>\nA: Multi Factor Authentication adds an extra layer of protection by requiring multiple factors of authentication, making it more difficult for bad actors to gain unauthorized access to systems or accounts. By adding additional factors such as biometric verification or hardware tokens, the risk of security breaches due to stolen passwords or phishing attacks is reduced.<\/p>\n<p>Q: What are the potential security risks associated with Multi Factor Authentication?<br \/>\nA: While Multi Factor Authentication can enhance security, there are still potential risks to consider. These may include the interception of SMS text messages or phishing attacks targeting authentication codes. It is important for users to be vigilant and follow best practices for secure authentication processes.<\/p>\n<p>Q: What are some modern Multi Factor Authentication methods?<br \/>\nA: Modern Multi Factor Authentication methods include adaptive authentication, risk-based authentication, AI-Powered Multi-Factor Authentication, and frictionless authentication techniques. These methods use advanced technologies like artificial intelligence to continuously assess risks and adapt authentication requirements based on user behavior.<\/p>\n<p>Q: How can businesses implement Multi Factor Authentication for their systems?<br \/>\nA: Businesses can implement Multi Factor Authentication by using authentication servers, hardware tokens, authenticator apps, or biometric verification methods. By setting up strong authentication measures and following best practices, businesses can enhance security for their corporate networks and protect against unauthorized access.<\/p>\n<p>These responses are based on general information about Multi Factor Authentication and common authentication practices. For more specific details and guidelines, it is recommended to consult sources such as the National Institute of Standards and Technology (NIST) Special Publications or industry best practice guides.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Why wait any longer? Secure your\u200d internet access \u2064and\u2064 increase your\u200b tech \u200dsecurity \u2062today by creating your \u2064FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> \u200baccount. With <a title=\"Multi Factor Authentication Something You Are\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-are\/\">strong multi-factor\u2064 authentication \u200cprocesses<\/a>\u2062 and \u2063innovative \u2063technologies, Something\u200c You Are guarantees a superior \u2062user experience\u2062 while keeping your data safe\u2062 and secure.\u2064 Get ready to experience the fastest \u2064and most comprehensive Multi-Factor Authentication solution\u200c \u2013 make \u2064your LogMeOnce<span data-sheets-root=\"1\">\u00a0<\/span>account today and enjoy\u200b greater security and \u2064fewer\u200c passwords \u2064than ever before!<\/p>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Multi\u200d Factor Authentication Something\u2062 You Are is an important security measure that helps protect \u200byour online\u200b identity \u200cand secure your\u200b sensitive \u200cdata. It\u200d ensures that you are indeed\u2063 the rightful user\u2062 by authenticating your identity using a combination\u2063 of factors.\u2064 The main factor \u200cused is\u2063 either something you \u200bknow,\u2063 something you have,\u200d or something you [&hellip;]<\/p>\n","protected":false},"author":27,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1294,783,21123,781,21124,21125],"class_list":["post-71684","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-authentication","tag-password","tag-password-tags-multi-factor-authentication","tag-security","tag-something-you-are","tag-something-you-know"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/27"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=71684"}],"version-history":[{"count":0,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/71684\/revisions"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=71684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=71684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=71684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}