{"id":73409,"date":"2024-06-20T19:01:03","date_gmt":"2024-06-20T19:01:03","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/14\/mfa-factor\/"},"modified":"2024-09-13T10:52:06","modified_gmt":"2024-09-13T10:52:06","slug":"mfa-factor","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/mfa-factor\/","title":{"rendered":"MFA Factor"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>MFA \u2064Factor \u2063is a term that has \u2062been \u200bgaining momentum \u200din\u2063 business circles. It stands for \u200b\u201dMastery, Focus and Automation\u201d. \u2062In \u2062its simplest form, \u2062it refers to the combination\u2063 of specialized \u2063knowledge, single-minded \u2062attention to detail\u200d and an efficient\u200d workflow \u200dto maximize efficiency\u2063 and\u2064 effectiveness. This synergistic approach has been observed \u200bto lead \u2063to any \u2062number \u200bof\u200b benefits, including\u2063 increased production, improved\u2063 customer \u2062satisfaction and a higher\u200b rate of return. Mastering the \u200bMFA\u2063 factor can\u200d be \u2064the\u200c key to success in any business, and can be achieved with\u200b a little effort and the right mindset.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#1_Understanding_MFA%E2%81%A3_Factors_An%E2%81%A2_Overview\" >1. Understanding MFA\u2063 Factors: An\u2062 Overview<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#2_What_Is%E2%81%A4_Multi-Factor%E2%80%8D_Authentication_MFA\" >2. What Is\u2064 Multi-Factor\u200d Authentication (MFA)?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#3_Benefits_of_Using_MFA_for%E2%80%8B_Security\" >3. Benefits of Using MFA for\u200b Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#4_How_%E2%81%A3to_%E2%81%A2Set_%E2%80%8CUp%E2%81%A2_Your_Own_MFA_System\" >4. How \u2063to \u2062Set \u200cUp\u2062 Your Own MFA System<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#Benefits_of_Multi-Factor_Authentication_MFA_for_Security\" >Benefits of Multi-Factor Authentication (MFA) for Security<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/mfa-factor\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-understanding-mfa-factors-an-overview\"><span class=\"ez-toc-section\" id=\"1_Understanding_MFA%E2%81%A3_Factors_An%E2%81%A2_Overview\"><\/span>1. Understanding MFA\u2063 Factors: An\u2062 Overview<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Understanding Multi-Factor Authentication (MFA) is\u200b key to ensuring data security. MFA refers to a security system where a user needs two or more authentication methods to access\u2062 a particular\u200b system such\u2062 as a\u200c website, application, computer network, etc.<\/p>\n<p>A few\u2062 examples of authentication methods are:<\/p>\n<ul>\n<li><strong>Something you know<\/strong> such as \u200cyour\u2064 username, password, or PIN code.<\/li>\n<li><strong>Something you have<\/strong> such \u2063as an ATM card, \u200da \u2064token,\u2063 a mobile\u200c phone, or a\u200d fob.<\/li>\n<li><strong>Something you are<\/strong> \u2063 such\u200c as\u2062 biometrics such as fingerprint,\u2062 face recognition or \u2062voice recognition.<\/li>\n<\/ul>\n<p>\u200dBy \u200dcombining two \u2064or\u200d more authentication methods, organizations are able \u2063to ensure \u2063that \u2063the identities of users accessing their systems \u2063are reliable \u2062and trustworthy. Additionally, MFA\u2062 provides\u200c additional layers of protection to \u2064keep \u2063hackers out of sensitive data. For example, if someone has\u200d hacked an account, they would have to\u200c have the \u2062authentication methods \u2064in \u2063order\u200c to gain\u200d access.<\/p>\n<h2 id=\"2-what-is-multi-factor-authentication-mfa\"><span class=\"ez-toc-section\" id=\"2_What_Is%E2%81%A4_Multi-Factor%E2%80%8D_Authentication_MFA\"><\/span>2. What Is\u2064 Multi-Factor\u200d Authentication (MFA)?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication\u200c (MFA) is a technique used to \u200cstrengthen access security. It \u200cadds \u2062an extra layer of protection by requiring users to authenticate \u200cthemselves using two\u2064 or more\u2063 separate \u200bmethods. By leveraging multiple \u2064pieces \u2064of\u2062 user-specific \u200dinformation, MFA makes \u2063sure that only the correct user can\u2064 gain access.<\/p>\n<p>The \u2064types \u2062of authentication used in \u2063MFA \u2062can include\u2063 something the user knows \u2062(like a\u2063 password or PIN), something \u200cthe user has (like\u200c an official\u200b ID\u200c card or a smartphone), or\u2063 something the \u2063user is (like their\u200d fingerprint or facial\u200d recognition). \u200bSome apps and services also use text messages \u200dfor authentication.\u2063<\/p>\n<p>This\u200b setup offers a higher level \u200dof security than traditional authentication \u2063methods. This is why MFA is used when accessing \u200dsensitive information, such as\u2063 financial accounts or work applications. With MFA,\u200b organizations \u200ccan \u200dbe\u200d sure that only the\u200d right people have access\u2062 to\u200d their data.<\/p>\n<h2 id=\"3-benefits-of-using-mfa-for-security\"><span class=\"ez-toc-section\" id=\"3_Benefits_of_Using_MFA_for%E2%80%8B_Security\"><\/span>3. Benefits of Using MFA for\u200b Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Multi-Factor Authentication for Security<\/b><\/p>\n<p>Multi-factor authentication (MFA) \u2062is\u200d becoming \u200ban increasingly popular security layer to bolster data and identity protection. It is used by many major\u200d companies in\u200d addition to government\u200b organizations, \u200dsuch\u2063 as \u2064banks, financial \u2063institutions, and healthcare \u2062providers. MFA \u2063verifies \u2064valid users and\u2063 blocks\u200c access to malicious actors, either robots\u200c or human actors\u2063 trying\u2062 to\u200d gain access illegally.\u200d Here are the\u2063 benefits associated with using MFA for security.<\/p>\n<p><b>Increased Protection of \u2062Data<\/b><\/p>\n<p>MFA provides an extra\u2064 layer\u200d of security, \u200bwhich can greatly reduce the chances of a \u2063data breach. On \u200dits own, a username\/password combination can be easily\u2063 guessed or\u200c stolen, but with the addition of MFA, it becomes much more difficult for an attacker to break into an \u2062account. \u200dSince the second layer of\u2063 authentication \u200dis typically time-sensitive, any unauthorized access is almost\u200b impossible.<\/p>\n<p><b>Ease of Use<\/b><\/p>\n<p>Though MFA \u2063adds \u2062an extra layer of security, \u200bit does not impede the user experience. In fact, it is \u2063incredibly\u200c easy \u200bfor the user\u2063 to utilize. All it requires is to input \u2064a one-time\u2064 security code or trigger \u2064a biometric authentication such as \u2064Touch ID \u200don\u200c the device. \u2063After the codes or\u200c biometric information has \u200dbeen verified, the user will\u200b be\u200d able \u200bto \u200caccess their account.<\/p>\n<p><b>Secure Access \u200cto Sensitive \u200dData or Locations<\/b><\/p>\n<p>Using MFA\u2064 also gives access to areas and \u200binformation that would otherwise be \u200boff-limits to the general public. For\u200c example, \u2063MFA can be\u2062 used\u200c to access server rooms or financial data \u2062that may\u2062 need to\u2064 be kept private. \u200bAdditionally, MFA \u200dprotocols can be \u2064established \u2062for computers and mobile devices, \u2063ensuring the safety of\u200d the system and\u200c any sensitive \u2063data it contains.<\/p>\n<h2 id=\"4-how-to-set-up-your-own-mfa-system\"><span class=\"ez-toc-section\" id=\"4_How_%E2%81%A3to_%E2%81%A2Set_%E2%80%8CUp%E2%81%A2_Your_Own_MFA_System\"><\/span>4. How \u2063to \u2062Set \u200cUp\u2062 Your Own MFA System<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Setting Up Your \u2062Own \u2063MFA \u200dSystem<\/b><\/p>\n<p>MFA, or multi-factor \u200dauthentication, is a \u200bway\u200c to \u2063secure\u200b access to various\u200d online accounts. It adds \u200can\u200c extra\u200d layer of \u200bprotection against\u200b malicious\u2063 actors attempting to \u200daccess sensitive \u2062information. \u2064To create \u200byour own MFA \u2064system, start by\u200d following these steps:<\/p>\n<ul>\n<li>Choose an MFA provider. There are many companies that \u2064offer \u200cMFA services.\u200d Be sure to pick one that is well-trusted and reliable. It is also \u200ba good idea to \u2062read the company\u2019s privacy\u200d policy.<\/li>\n<li>Activate the MFA service.\u200b Provide\u200b information such as your \u2063phone number,\u200d email \u200baddress,\u2063 etc. to ensure that \u2062if someone does try to\u200d access your account, the MFA provider can send\u200b a code\u2063 or alert \u200bto you.<\/li>\n<li>Enable MFA\u2062 on all your online \u200daccounts. With your \u200dMFA provider set up, you can now\u200c enable the feature \u200cfor each\u2064 of your online\u200b accounts. Most \u2062<a href=\"https:\/\/logmeonce.com\/how-logmeonce-works\/\">sites provide simple instructions<\/a> on how \u200bto do this, or \u200cyou can install the MFA company\u2019s app for \u200bfull \u200bservice.<\/li>\n<\/ul>\n<p>Once \u2064you have your\u200b MFA \u200bsystem in \u200dplace, \u2062be sure to keep it up to date. Providers will often \u2064change authentication\u200d methods or \u200dupgrade security\u2062 protocols with\u2064 new patches or software \u200cupdates. Keeping \u2064your \u2062MFA system\u200b up to \u2064date will \u2064help ensure\u2064 that your online accounts remain \u200csecure.<\/p>\n<p>Multi-factor authentication (MFA) is a method of security that requires multiple forms of verification before granting access to a system or account. It adds an extra layer of security to protect against unauthorized access by combining factors such as something the user knows (like a password), something they have (like a mobile device or security token), and something they are (like biometric data such as fingerprints or facial recognition).<\/p>\n<p>MFA helps to mitigate security risks and enhance protection against cyber attacks such as phishing, brute force attacks, and social engineering. According to industry compliance mandates such as the Payment Card Industry Data Security Standard (PCI DSS) and guidelines from sources like NIST Special Publication 800-63, implementing multi-factor authentication is essential for ensuring strong authentication mechanisms and enhancing digital security.<\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure used by organizations to protect their sensitive information and prevent unauthorized access to their systems. It involves the use of multiple authentication factors to verify the identity of users before granting them access to a system or application. Some common authentication factors include something the user knows (like a password), something the user has (like a physical token or smart card), and something the user is (like a fingerprint or retina scan).<\/p>\n<p>Push notifications, fingerprint scans, adaptive authentication, and risk-based authentication are some of the advanced authentication methods used in MFA systems. These additional security measures help to enhance the security of the authentication process and protect against various threats such as phishing attacks, credential stuffing, and man-in-the-middle attacks. By combining multiple authentication factors, organizations can create a robust security framework that is difficult for bad actors to bypass.<\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure that requires users to provide two or more factors of authentication to verify their identity before they can access a system or application. This additional layer of security helps protect against unauthorized access by requiring multiple forms of authentication, such as something the user knows (like a password), something the user has (like a physical device or authenticator app), or something the user is (biological traits or behavioral analysis).<\/p>\n<p>Common forms of MFA include two-factor authentication, one-time passwords, and biometric verification methods. Implementing MFA is recommended by industry experts and compliance standards, such as NIST SP 800-63 and NIST SP 800-171, to enhance security and protect sensitive data from threats like social engineering attacks or brute force methods.<\/p>\n<p>Multi-factor authentication (MFA) is a crucial aspect of modern security measures in digital environments. It involves using multiple verification factors to confirm the identity of a user, adding an extra layer of protection beyond just a password. Some common authentication factors include possession factors like a mobile phone or USB device, knowledge factors like a personal security question, and inherence factors like behavioral biometrics. MFA helps to mitigate the risk of unauthorized access by requiring users to provide evidence from different categories before granting access.<\/p>\n<p>This approach not only enhances security but also improves the overall user experience by offering a seamless and frictionless authentication process. In industries with specific compliance obligations, MFA is often a mandatory requirement to ensure data protection and security. By incorporating various forms of authentication factors, MFA provides robust security measures and safeguards against cyber threats. Sources: National Institute of Standards and Technology (NIST) Special Publication 800-63-3: Digital Identity Guidelines<\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure for protecting sensitive information and data. It involves the use of multiple authentication factors to verify the identity of a user before granting access to a system or application. These factors can include something the user knows (such as a password), something the user has (such as a hardware token or mobile device), or something the user is (such as biometric data). By requiring multiple factors for authentication, MFA significantly increases the security of a system, reducing the risk of unauthorized access by threat actors. According to industry-specific compliance obligations like NIST SP 800-63 and NIST SP 800-31B, MFA is recommended as a best practice for enhancing security and protecting against unauthorized access. Sources: NIST Special Publication 800-63<\/p>\n<p>Multi-factor authentication (MFA) is a crucial component of cybersecurity, especially in corporate networks where sensitive information is stored. MFA involves the use of multiple authentication factors to verify a user&#8217;s identity and grant access to secure systems. These factors can include something a user knows (such as a password), something they have (like a security token or USB port), or something they are (biometric data like fingerprints or facial recognition). By requiring users to provide multiple pieces of evidence to prove their identity, MFA adds an extra layer of security to the authentication process.<\/p>\n<p>According to the National Institute of Standards and Technology (NIST), MFA is recommended as a best practice for ensuring the security of user accounts and preventing unauthorized access. In fact, NIST Special Publication 800-63-3 outlines guidelines for implementing MFA in government systems to meet compliance requirements and protect sensitive data. Additionally, information security experts recommend using a combination of authenticators, such as SMS codes, hardware tokens, and biometric identifiers, to create a robust authentication system.<\/p>\n<p>In conclusion, MFA factors play a vital role in enhancing the security of authentication processes and reducing the risk of unauthorized access. By implementing multi-factor authentication solutions, organizations can significantly mitigate the threat of cyber-attacks and safeguard their valuable information assets.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Multi-Factor_Authentication_MFA_for_Security\"><\/span>Benefits of Multi-Factor Authentication (MFA) for Security<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Explanation<\/th>\n<\/tr>\n<tr>\n<td>Increased Protection of Data<\/td>\n<td>MFA provides an extra layer of security, reducing the chances of a data breach.<\/td>\n<\/tr>\n<tr>\n<td>Ease of Use<\/td>\n<td>MFA is user-friendly, requiring simple actions like entering a security code or using biometric authentication.<\/td>\n<\/tr>\n<tr>\n<td>Secure Access to Sensitive Data or Locations<\/td>\n<td>MFA enables access to restricted areas or sensitive information, ensuring privacy and security.<\/td>\n<\/tr>\n<tr>\n<td>Blocks Unauthorized Access<\/td>\n<td>MFA verifies valid users and prevents unauthorized access by malicious actors.<\/td>\n<\/tr>\n<tr>\n<td>Enhanced Security Measures<\/td>\n<td>MFA adds an extra layer of protection against cyber threats like phishing attacks and brute force attempts.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2><span class=\"ez-toc-section\" id=\"Q_A\"><\/span><span style=\"color: revert; font-size: inherit; font-weight: inherit;\">Q&amp;A<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What\u200b is an \u2064MFA\u2064 Factor?<\/p>\n<p>A: MFA \u200cFactor stands for \u201cMulti-Factor Authentication\u201d.\u200c It\u2019s a \u2064way of making\u2062 sure that people can\u200b securely access \u2064your\u200b account using\u200b a \u2064combination of different factors, like a password, fingerprint, or eye scan.\u2062 It\u200d helps to keep \u200dyour accounts \u2062more\u200d safe and secure. \u200d<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-[20px] text-message flex w-full flex-col items-end gap-2 break-words [.text-message+&amp;]:mt-5 overflow-x-auto whitespace-normal\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"4bc2598d-4625-4b8d-a586-3ce9a3c5276a\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>As we conclude our article on MFA, we encourage readers to safeguard their online accounts by creating a FREE <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> account. LogMeOnce secures your accounts with a user-friendly and robust multi-factor authentication approach, perfect for dual authentication and enhanced security. With LogMeOnce&#8217;s advanced MFA management system, your online identity will be better protected against hackers and data theft.<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Secure your data with MFA Factor! If you need to create an account for MFA Factor, sign up for a FREE LogMeOnce account with Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. Protect your login with MFA now!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[6629,21542,21543,9180,21544,11055,6853],"class_list":["post-73409","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-algorithm","tag-factorization","tag-ization-machine-learning","tag-mathematics","tag-matrix","tag-mfa","tag-optimization"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=73409"}],"version-history":[{"count":4,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73409\/revisions"}],"predecessor-version":[{"id":225408,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73409\/revisions\/225408"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=73409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=73409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=73409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}