{"id":73572,"date":"2024-06-20T19:22:50","date_gmt":"2024-06-20T19:22:50","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/14\/2fa-mfa-authentication\/"},"modified":"2024-09-15T07:57:32","modified_gmt":"2024-09-15T07:57:32","slug":"2fa-mfa-authentication","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/","title":{"rendered":"2FA MFA Authentication"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>Life today relies\u2062 upon\u200d complex\u2062 security solutions like\u2063 2FA MFA Authentication. Two-factor \u200cauthentication (2FA) and Multi-factor Authentication (MFA) are two \u200cof the most important security measures to protect our data from cyber threats. Both 2FA MFA Authentication options \u2064act as a barrier between hackers and the target, providing more\u200c secure protection for our valuable data. 2FA MFA Authentication \u200btakes cyber security to the next level\u200d and adds an\u200c extra layer of protection to ensure \u2063that data is \u200bprotected from malicious attacks.<\/p>\n<p>Two<a title=\"Two Factor Authentication Online\" href=\"https:\/\/logmeonce.com\/resources\/two-factor-authentication-online\/\">-factor \u2062authentication requires users<\/a> to\u200b use\u2062 two\u200c forms\u200c of authentication, such as a \u200busername and password, as well as \u2064a \u2064token or code that is sent\u200c via text message or email. Multi-factor authentication requires\u200d users to\u200d use three\u200d or more authentication methods which could include biometric data, a physical token or a \u200cone-time-password. Both 2FA and MFA Authentication offer enhanced levels of\u2062 data security,\u2064 preventing malicious actors from gaining\u2062 access\u2063 to\u200b sensitive data. This article will explain\u2063 the benefits\u200b and drawbacks of 2FA and MFA Authentication, and how organizations can implement them to protect\u200d their data.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#1_Two-Step%E2%80%8C_Authentication_%E2%80%93_Why%E2%81%A2_it_Matters\" >1. Two-Step\u200c Authentication \u2013 Why\u2062 it Matters<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#2_Understanding_%E2%80%8BMulti-Factor_Authentication_MFA\" >2. Understanding \u200bMulti-Factor Authentication (MFA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#3_Simple_Ways_to_Protect_Yourself_with%E2%80%8D_2FA_MFA\" >3. Simple Ways to Protect Yourself with\u200d 2FA MFA<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#4_%E2%81%A4What%E2%80%8B_are_the_Benefits_of_2FA_%E2%81%A2MFA_Authentication\" >4. \u2064What\u200b are the Benefits of 2FA \u2062MFA Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#Benefits_of_Multi-Factor_Authentication_MFA\" >Benefits of Multi-Factor Authentication (MFA)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/2fa-mfa-authentication\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-two-step-authentication-why-it-matters\"><span class=\"ez-toc-section\" id=\"1_Two-Step%E2%80%8C_Authentication_%E2%80%93_Why%E2%81%A2_it_Matters\"><\/span>1. Two-Step\u200c Authentication \u2013 Why\u2062 it Matters<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Two-Step Authentication<\/b> is a must-have for online\u200d security.\u200b It adds an additional layer of\u2063 security to \u2062protect user \u2063accounts from being \u2063hacked\u2062 or \u200caccessed by unauthorized visitors. Here\u2019s \u200bwhy two-step authentication matters:<\/p>\n<ul>\n<li>Extra Security Level: Two<a href=\"https:\/\/logmeonce.com\/dangers-of-weak-password\/\">-step authentication\u2063 requires users<\/a> to input\u2063 an additional code (sent to their \u200cemail or phone number) to access an account. This makes it extremely \u200ddifficult to \u2063break into someone\u2019s account.<\/li>\n<li>Protects \u200bPrivacy: \u200bWith two-step \u200cauthentication, only the user can access \u200btheir data. No one\u200d else can gain access to it, which is especially valuable in\u2064 a work environment.<\/li>\n<li>Lose Phones Without\u2064 Fear: Even if a user\u2064 loses \u200ctheir phone \u2064or their password gets \u200chacked, two-step\u2064 authentication\u200d will ensure that any additional attempts to\u2064 gain access will \u200dbe blocked. No extra codes will be sent and\u200c the account will remain untouched.<\/li>\n<li>Secure Purchases: Online purchases\u200b made with two-step authentication\u2064 are much\u200d more secure and have \u200bless chance of becoming compromised.<\/li>\n<\/ul>\n<p>Overall, two-step authentication is \u2064crucial for protecting user accounts and\u200c data from unauthorized \u200daccess.\u2063 It offers an extra layer of security \u2063that no other \u2063authentication method can provide. It\u200c is absolutely essential \u2064for online security,\u2063 so\u200b if\u2062 you don\u2019t have it already, it\u2019s worth activating for all of your \u2064important accounts.<\/p>\n<h2 id=\"2-understanding-multi-factor-authentication-mfa\"><span class=\"ez-toc-section\" id=\"2_Understanding_%E2%80%8BMulti-Factor_Authentication_MFA\"><\/span>2. Understanding \u200bMulti-Factor Authentication (MFA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-factor authentication (MFA) \u2064is an added security \u200blayer designed to protect access to sensitive information. When a user attempts to log \u2064in, they \u2063will be\u2062 required to provide at least\u200d two verifiable \u200bforms of identification. These methods\u2062 could include \u200csomething that the user knows\u200b (like a PIN or password), something that the user has \u2063(like a \u200dsmart card \u200dor \u2062security token), or \u200da biometric\u2063 measure \u2062(like \u200da fingerprint or retinal \u200dscan).<\/p>\n<p>MFA \u2063is gaining in popularity \u200dbecause it provides \u2063a higher level of assurance than traditional authentication methods. It also ensures that \u200bonly those with\u2064 legitimate credentials can access\u2063 a system or digital asset. \u2062With MFA, if one\u200c layer of security\u200c fails, all the other levels\u200b can still \u2064act as\u2064 a \u2063barrier, helping to protect both corporate and \u200dpersonal data. \u200bIt\u2019s an essential component of any secure \u2063network infrastructure, providing an additional layer of \u200bpeace of mind that confidential information remains secure.<\/p>\n<ul>\n<li><strong>Knowledge\u200b Factors<\/strong> \u2013 this consists of something a user knows \u200cwhich can include passwords,\u200d PINs or security questions<\/li>\n<li><strong>Possession Factors<\/strong> \u2013 this includes something\u2063 a user has\u2064 that they can access, such as a \u200dsecure\u200d token, phone, or a biometric device<\/li>\n<li><strong>Inherence Factors<\/strong> \u200b \u2013 \u200bthis includes \u2064something a user\u200b is, such as a \u200cfingerprint,\u2062 voice \u200cprint, or a retinal\u200b scan<\/li>\n<\/ul>\n<h2 id=\"3-simple-ways-to-protect-yourself-with-2fa-mfa\"><span class=\"ez-toc-section\" id=\"3_Simple_Ways_to_Protect_Yourself_with%E2%80%8D_2FA_MFA\"><\/span>3. Simple Ways to Protect Yourself with\u200d 2FA MFA<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Multi-Factor Authentication (MFA) and Two-Factor Authentication (2FA) are essential\u2062 tools for protecting \u2064yourself, and your accounts, online. There \u2062are\u200d a few simple strategies that \u2063can\u2062 help \u2064keep you secure:<\/p>\n<ul>\n<li><strong>Start Using MFA \u2064or 2FA: <\/strong>Enable this\u2064 setting on any account \u200bthat \u2063offers it. \u2062It\u2063 will add an extra \u2064layer \u2064of security so a hacker will need\u200c more than just your\u2062 password \u200dto access your account.<\/li>\n<li><strong>Recovery \u2063Codes:\u2062 <\/strong>Keep \u2062a secure, separate \u2062record of your recovery codes and make sure you save them\u2062 in\u200d a\u200d place that is inaccessible to cyber criminals.<\/li>\n<li><strong>Secure Apps \u200d&amp;\u2064 Browser: <\/strong>Update your phone apps as soon as \u200bnew versions become available, as these often\u200b include new\u2064 security \u2063features. Additionally, keeping your browser secure\u2064 and\u200c regularly clearing \u2062out your cookies can help ensure your safety.<\/li>\n<\/ul>\n<p>These\u2064 strategies may \u200cseem simple, but they are \u2062essential for keeping your online\u200d data\u2064 secure.\u2064 Taking the time to learn about\u2063 and \u2064implement MFA and \u200b2FA can pay \u2064off \u2063in\u200c the long run.<\/p>\n<h2 id=\"4-what-are-the-benefits-of-2fa-mfa-authentication\"><span class=\"ez-toc-section\" id=\"4_%E2%81%A4What%E2%80%8B_are_the_Benefits_of_2FA_%E2%81%A2MFA_Authentication\"><\/span>4. \u2064What\u200b are the Benefits of 2FA \u2062MFA Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Password \u200dProtection<\/strong><\/p>\n<p>Two-factor authentication (2FA) \u200badds an extra layer of \u2064security to your online accounts. It requires both a password and something else, such as \u200ba code sent via text message to your phone or \u200ba biometric identifier like a fingerprint. \u200cThe combination\u200c of\u200b these elements \u200cmakes your\u2064 accounts\u200b more\u2063 secure because\u2063 it\u2019s \u2063incredibly difficult for someone to gain \u200caccess without a legitimate \u200dcode\u2062 or biometric \u200cdata. \u2063<\/p>\n<p><strong>Increased \u2064Confidence<\/strong><\/p>\n<p>The added security of 2FA\u2064 also helps \u200byou \u2064feel more secure when making online \u200cpurchases. You can rest assured that your information\u2062 is \u200cbetter protected and are \u2064less likely to be \u2064the\u2064 victims of \u2063fraud or data theft.\u2062 Identity\u200c theft is an\u2064 increasingly common crime, but with \u20632FA, you have the added peace of mind of knowing that your data is as safe as possible.<\/p>\n<p>With 2FA, you can\u200d also customize the level of \u2063security that \u200dyou rely\u200b on, meaning you have\u2064 more \u200bcontrol over how much protection is needed to \u2064access data. This individualized\u200c approach ensures that data \u2064is secure, while \u2064allowing you to be comfortable with the level of security that \u200bbest\u2064 meets your \u200bneeds. \u200d<\/p>\n<p>Multi-factor authentication (MFA) is a crucial form of security that goes beyond traditional passwords to protect digital resources from unauthorized access. This authentication method requires users to provide two or more distinct authentication factors in order to verify their identity. These factors can include something they know, like a password or PIN code, something they have, like a mobile phone or hardware device, or something they are, like facial recognition or biometric factors such as fingerprint or iris scanning. By requiring multiple factors for authentication, MFA provides an additional layer of security against cyber threats such as brute-force attacks or compromised accounts.<\/p>\n<p>One common form of MFA is two-factor authentication (2FA), which typically involves a combination of something the user knows, like a password, and something they have, like a mobile phone for receiving a verification code. This approach adds an extra level of security beyond traditional single-factor authentication methods. Another type of MFA is three-factor authentication, which further enhances security by requiring three separate authentication factors. Different organizations may choose to implement various forms of MFA based on their specific security needs and risk assessment.<\/p>\n<p>MFA solutions can vary in complexity, with some utilizing advanced technologies like artificial intelligence or adaptive authentication to continuously assess the risk level of login attempts. These technologies can help detect suspicious activity and provide additional security measures to protect against unauthorized access. It is important for organizations to find a balance between security and user convenience when implementing MFA, as overly complex authentication methods may deter users from accessing essential resources.<\/p>\n<p>Overall, MFA plays a vital role in strengthening user credentials and safeguarding digital assets from security threats. By incorporating multiple authentication factors, organizations can significantly reduce the risk of unauthorized access and mitigate potential vulnerabilities in their systems. It is essential for businesses and individuals alike to prioritize the implementation of MFA solutions to ensure secure access to online services and resources.<\/p>\n<p>Multi-factor authentication (MFA) is a crucial security measure that requires users to provide two or more authentication factors before gaining access to a system or account. These authentication factors can include something the user knows (knowledge factor), such as a password or PIN, something the user has (physical object), such as a security token or a smartphone, or something the user is (physical characteristics), such as a fingerprint or retina scan. By combining these different factors, MFA adds an extra layer of security beyond just using a password, making it more difficult for unauthorized users to gain access. Implementing MFA can help protect against common security threats such as human error, password attacks, and unauthorized access. Sources: nccoe.nist.gov<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Benefits_of_Multi-Factor_Authentication_MFA\"><\/span>Benefits of Multi-Factor Authentication (MFA)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Benefits<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Password Protection<\/td>\n<td>Adding an extra layer of security with a combination of password and additional factor<\/td>\n<\/tr>\n<tr>\n<td>Increased Confidence<\/td>\n<td>Feeling more secure in online transactions and protecting against identity theft<\/td>\n<\/tr>\n<tr>\n<td>Enhanced Security<\/td>\n<td>Protects against cyber threats like brute-force attacks and compromised accounts<\/td>\n<\/tr>\n<tr>\n<td>Customizable Security<\/td>\n<td>Allows users to choose the level of security that meets their needs<\/td>\n<\/tr>\n<tr>\n<td>Advanced Technologies<\/td>\n<td>Utilizing AI and adaptive authentication for continuous risk assessment<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is 2FA MFA \u2062Authentication? \u2063<br \/>\nA: 2FA MFA\u2062 Authentication is a way to protect\u200d your accounts with extra security. It\u2019s like a \u200cdouble lock on your accounts.\u200b It requires \u2062you \u200bto input two different things, such \u200bas a password and \u2063a code\u2062 from your \u2062phone. That way, only\u2064 you are able \u200dto \u200blog in.<\/p>\n<p>Q: What is multi-factor authentication (MFA)?<br \/>\nA: Multi-factor authentication (MFA) is a security measure that requires users to provide two or more pieces of evidence (factors) to verify their identity. This can include something the user knows (like a password), something they have (like a security key), or something they are (like a fingerprint scan). Source: National Institute of Standards and Technology (NIST) Special Publication 800-63B<\/p>\n<p>Q: What are the types of authentication factors used in MFA?<br \/>\nA: The types of authentication factors used in MFA include something you know (like a password), something you have (like a physical device), and something you are (like a biometric scan). These factors work together to provide a more secure method of verifying user identities. Source: TechTarget<\/p>\n<p>Q: What is two-factor authentication (2FA)?<br \/>\nA: Two-factor authentication (2FA) is a type of MFA that requires users to provide two different factors of authentication to access their accounts. This typically involves a combination of something the user knows (like a password) and something they have (like a mobile device). Source: The Verge<\/p>\n<p>Q: What are some common types of authentication factors used in MFA?<br \/>\nA: Some common types of authentication factors used in MFA include passwords, hardware tokens, biometric authentication (like fingerprint scans), and SMS codes. These factors add an extra layer of security to the authentication process. Source: IBM Security<\/p>\n<p>Q: What is adaptive authentication?<br \/>\nA: Adaptive authentication is a type of MFA that uses risk-based analysis to determine the level of security needed for each authentication attempt. This approach helps balance security with user experience by adjusting the authentication requirements based on factors like user behavior and location. Source: Gartner Glossary<\/p>\n<p>Q: How can MFA help protect against security risks?<br \/>\nA: MFA can help protect against security risks by requiring multiple pieces of evidence to verify a user&#8217;s identity. This approach makes it harder for bad actors to gain unauthorized access to accounts, as they would need to bypass multiple layers of security measures. Source: Microsoft Security Blog<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-[20px] text-message flex w-full flex-col items-end gap-2 break-words [.text-message+&amp;]:mt-5 overflow-x-auto whitespace-normal\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"b677dffe-fc74-45e7-8598-49c7ddbc3c84\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Don\u2019t risk your online security\u2014protect your personal information with LogMeOnce\u2019s powerful two-factor (2FA) and multi-factor (MFA) authentication solutions. Take control of your online safety by creating a FREE account today. <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> offers robust 2FA and MFA options, making it easy to secure your data within minutes. Explore its additional features like Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring to keep your information safe. 2FA and MFA are essential for cybersecurity\u2014don\u2019t miss out!<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Unlock the power of 2FA MFA Authentication for enhanced security. Safeguard your accounts with ease by creating a FREE LogMeOnce account, featuring Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. Ensure your 2FA MFA setup is secure and simple!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[1149,1294,2316,11055,19807,781,1788],"class_list":["post-73572","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-2fa","tag-authentication","tag-authentication-methods","tag-mfa","tag-multifactor-authentication","tag-security","tag-two-factor-authentication"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73572","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=73572"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73572\/revisions"}],"predecessor-version":[{"id":225751,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/73572\/revisions\/225751"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=73572"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=73572"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=73572"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}