{"id":74394,"date":"2024-06-20T23:05:31","date_gmt":"2024-06-20T23:05:31","guid":{"rendered":"https:\/\/logmeonce.com\/resources\/2023\/08\/15\/multi-factor-authentication-something-you-have\/"},"modified":"2024-10-03T14:26:56","modified_gmt":"2024-10-03T14:26:56","slug":"multi-factor-authentication-something-you-have","status":"publish","type":"post","link":"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/","title":{"rendered":"Multi Factor Authentication Something You Have"},"content":{"rendered":"<div class=\"336cb5b64765e27a1a6c1bb71b941f1a\" data-index=\"1\" style=\"float: none; margin:10px 0 10px 0; text-align:center;\">\n<script async src=\"https:\/\/pagead2.googlesyndication.com\/pagead\/js\/adsbygoogle.js?client=ca-pub-4830628043307652\"\r\n     crossorigin=\"anonymous\"><\/script>\r\n<!-- above content -->\r\n<ins class=\"adsbygoogle\"\r\n     style=\"display:block\"\r\n     data-ad-client=\"ca-pub-4830628043307652\"\r\n     data-ad-slot=\"5864845439\"\r\n     data-ad-format=\"auto\"\r\n     data-full-width-responsive=\"true\"><\/ins>\r\n<script>\r\n     (adsbygoogle = window.adsbygoogle || []).push({});\r\n<\/script>\n<\/div>\n<p>These days, our digital security is\u2063 more\u200d important \u2064than ever. To protect our\u2063 data\u200d and personal \u2062information online, many\u2064 companies are utilizing technologies like Multi-Factor Authentication (MFA) Something You Have. This type of authentication \u2064involves using \u200bsomething\u2064 physical \u2013 \u2062like a card, token or biometrics \u2013 as\u200b an \u200cadditional \u200dlayer of security \u2064when verifying \u2064and\u2063 authorizing access to sensitive information.\u2063 MFA Something You Have provides \u200dan\u200d extra \u200dsecurity layer, protecting our information\u200b from online threats like phishing attempts, malware or other\u2062 cyberattacks. \u2064With an\u2062 increased demand for online security, Multi-Factor Authentication Something \u2064You Have is becoming the go-to solution for\u200d businesses looking to maintain a secure digital environment.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_77 counter-hierarchy ez-toc-counter ez-toc-grey ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title\" style=\"cursor:inherit\">Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#1_What_is_%E2%80%98Something_You_Have_Multi-Factor_Authentication\" >1. What is \u2018Something You Have\u2019 Multi-Factor Authentication?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#2_Why%E2%80%8C_You_Should_Use_%E2%80%98Something_You%E2%81%A4_Have_Multi-Factor_Authentication\" >2. Why\u200c You Should Use \u2018Something You\u2064 Have\u2019 Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#3%E2%81%A4_Different_Types_of_%E2%80%98Something_%E2%81%A2You_Have_Multi-Factor_Authentication\" >3.\u2064 Different Types of \u2018Something \u2062You Have\u2019 Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#4_Gaining_Many%E2%80%8C_Benefits_From_%E2%80%98Something_You_Have_Multi-Factor_Authentication\" >4. Gaining Many\u200c Benefits From \u2018Something You Have\u2019 Multi-Factor Authentication<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#Multi-Factor_Authentication_MFA_Factors\" >Multi-Factor Authentication (MFA) Factors<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#Q_A\" >Q&amp;A<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/logmeonce.com\/resources\/multi-factor-authentication-something-you-have\/#Conclusion\" >Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2 id=\"1-what-is-something-you-have-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"1_What_is_%E2%80%98Something_You_Have_Multi-Factor_Authentication\"><\/span>1. What is \u2018Something You Have\u2019 Multi-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>What is \u2018Something You Have\u2019 \u2063Multi-Factor Authentication?<\/strong><\/p>\n<p>Multi-factor authentication (MFA) is \u200ca security system that requires \u2064more than one method of authentication\u200b from \u2062independent categories of credentials to verify the user\u2019s identity. \u2018Something You Have\u2019 refers to the elements of MFA that include physical objects like physical tokens and USB sticks. \u200cIt provides additional security by requiring a second form of authentication that the user must possess to gain\u2062 access to a \u2063system.<\/p>\n<p>The user will be provided with a small physical \u2063device that displays a unique code that must be entered in addition to their username and password for access. As long as the device is in the user\u2019s physical possession, the\u200c user\u2062 will be securely authenticated. This \u2062second factor of authentication adds an extra layer of security\u2062 that would not be present with a\u200c traditional\u200d username and password combination and prevents unauthorized access even if someone obtains \u2063their username \u200cand password.<\/p>\n<h2 id=\"2-why-you-should-use-something-you-have-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"2_Why%E2%80%8C_You_Should_Use_%E2%80%98Something_You%E2%81%A4_Have_Multi-Factor_Authentication\"><\/span>2. Why\u200c You Should Use \u2018Something You\u2064 Have\u2019 Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Multi-factor authentication adds an extra layer of protection to your\u2062 accounts.<\/strong> By \u2062combining\u2063 something you know \u2064(like\u200d a password), something you have (like a\u2064 security key\u2062 or code sent to your \u200csmartphone), and \u2064something you are (like fingerprint or face recognition), it can\u2062 help ensure only you have \u2062access. Here \u200care a few\u2063 reasons why you should consider \u2018something you have\u2019 authentication:<\/p>\n<ul>\n<li>Rather than \u2063relying on memorized passwords, the second factor of authentication\u2014something \u2062you\u2063 have\u2014makes\u200c your accounts significantly more secure.<\/li>\n<li>It is\u2062 designed to identify and authenticate a person trying to access an account. This\u200b process \u2063verifies that you\u2019re really you, \u200dand adds another layer \u200cof protection. For example, \u2062your smartphone\u200c receives\u200c a code that you must input to gain\u2062 access.<\/li>\n<li>Multi-factor authentication can also help amp up online security by continuously verifying your \u200cidentity.<\/li>\n<li>With most Multi-Factor authentication, you \u200ddon\u2019t \u200bneed to access your device to authenticate for each website, as each code \u2062should\u2064 work \u2062for multiple sites.<\/li>\n<\/ul>\n<p>Having\u200d best practices\u2063 in place for your authentication is key\u200d to keeping your\u200c accounts safe. Multi-factor authentication\u2063 is one\u200b of the\u200c best tools \u2062you have to do just that. It ensures that \u2064even if your username and password fall into the wrong hands, all is not yet\u200b lost, as an attacker would also need access to the device containing the code \u200bor the authentication keys.<\/p>\n<h2 id=\"3-different-types-of-something-you-have-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"3%E2%81%A4_Different_Types_of_%E2%80%98Something_%E2%81%A2You_Have_Multi-Factor_Authentication\"><\/span>3.\u2064 Different Types of \u2018Something \u2062You Have\u2019 Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><strong>Something You Have Multi-Factor Authentication<\/strong> \u2063 is an authentication process \u2063that uses two or more \u200cmethods to verify a user\u2019s identity. It is a \u2062common method for increasing\u2064 online security\u2063 as it helps protect confidential\u2062 information from being stolen.<\/p>\n<p>There are several different types of \u200b\u2018Something You \u2064Have\u2019\u200c multi-factor authentication available. \u200dThey include:<\/p>\n<ul>\n<li>Security\u200c tokens: Physical tokens that generate codes that can be\u200b used to verify a user\u2019s identity.<\/li>\n<li>Software tokens: Mobile applications installed on mobile devices that generate unique\u200c token \u2062codes.<\/li>\n<li>Smart cards: Physical cards, \u200dusually featuring a \u200dchip, that are used\u2063 by placing them in a card reader \u2063on a device.<\/li>\n<li>Memory cards: Flash memory cards, such as an \u200dSD\u200c card, that can\u2062 be inserted into a slot on a device.<\/li>\n<li>Biometrics: Authentication techniques that use an\u2063 individual\u2019s physical traits, such as \u2062a fingerprint or voice.<\/li>\n<\/ul>\n<p>Each of \u200dthese methods has its own set \u2062of strengths and weaknesses, which can vary depending on the security\u200b level required \u200dfor a\u200d particular application. Some are more \u2062secure than \u2062others, while some \u200care easier to implement. Regardless, \u200bmulti-factor authentication is \u2064one of the best ways to ensure\u2063 that confidential data is kept safe.<\/p>\n<h2 id=\"4-gaining-many-benefits-from-something-you-have-multi-factor-authentication\"><span class=\"ez-toc-section\" id=\"4_Gaining_Many%E2%80%8C_Benefits_From_%E2%80%98Something_You_Have_Multi-Factor_Authentication\"><\/span>4. Gaining Many\u200c Benefits From \u2018Something You Have\u2019 Multi-Factor Authentication<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>When \u2062it comes \u2063to protecting your\u2063 digital assets, a <a href=\"https:\/\/logmeonce.com\/business-total-security\/\">multi-factor authentication system<\/a> is indispensable.\u00a0Instead of\u2064 relying\u2063 on one factor (like a simple password) to protect your account, multi-factor authentication requires two or more \u2064factors to verify who you are. This means that someone trying to access your account would\u2062 need\u200b to know \u2063not just one \u200bpiece of information, but multiple pieces.<\/p>\n<p>There are \u200dmany benefits of using \u2018Something You Have\u2019 multi-factor authentication for your accounts. Here are just a few:<\/p>\n<ul>\n<li><b>Increased Security:<\/b> By using two or more authentication factors, your account is much more secure. It minimizes the risk of someone being\u200c able to gain unauthorized\u2062 access with only one piece\u200c of\u200b information.\u2064<\/li>\n<li><b>Simple and Convenient:<\/b> \u2062Multi-factor authentication can\u200d be\u200b as simple as \u2062a text message or code sent to your phone. At the same time, it adds an extra\u200d layer of protection that can make\u2062 it even more\u200b convenient and \u2063secure\u200c than a standard password.<\/li>\n<li><b>Cost Savings:<\/b> By implementing a multi-factor authentication system, you\u200b can save money on\u200d hiring outside security. It can also prevent\u2062 losses caused by unauthorized\u2064 activity on your account.<\/li>\n<\/ul>\n<p>Whether you\u2019re an individual or a business, \u2018Something You Have\u2019 \u200bmulti-factor authentication can provide you with\u2064 the\u2064 security and convenience \u200dyou\u200b need.\u200c It\u2063 can also \u2063help you save money and protect your digital assets. \u2063So why not give it a try?<\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires individuals to provide two or more verification factors before gaining access to their accounts or systems. These factors can include something you have (such as a hardware token or debit card), something you know (like a password or pin code), or something you are (such as a fingerprint or facial scan).<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\"> By using multiple authentication methods, MFA adds layers of security to protect against unauthorized access, phishing attacks, and other security risks. MFA can also enhance the customer experience by providing additional security measures without sacrificing convenience. Common MFA methods include biometric authentication, adaptive authentication, and time-based verification codes sent via SMS text message or authenticator apps.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires multiple forms of verification before granting access to a system or account. Some common factors of authentication include something you have, such as a security token or hardware device, something you know, like a password or security question, and something you are, such as a fingerprint or facial recognition. Utilizing multiple factors of authentication can significantly enhance security by making it more difficult for unauthorized users to access sensitive information. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">In fact, according to the Microsoft Security Intelligence Report, implementing MFA can block 99.9% of account compromise attacks. Additionally, the National Institute of Standards and Technology (NIST) recommends the use of MFA as an effective way to protect against cyber threats and unauthorized access. With the rise of cybercrime and data breaches, it is essential for organizations to implement modern MFA solutions to safeguard their systems and user accounts effectively.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires users to provide two or more verification factors to access their accounts or information. These factors can include something you have, such as a physical device like a USB hardware token, bank card, or smart card reader. Biometric methods, such as fingerprint scans, voice recognition, and retina scans, also fall into this category.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\"> Additionally, physical location and IP address can be used as possession factors for authentication. Time-based factors, like the time of day or real-time authentication requests, add an extra layer of security. Modern MFA solutions often incorporate risk-based authentication, which assesses the level of risk associated with a login attempt before granting access. By combining various authentication factors, MFA enhances security and protects against unauthorized access. Source: https:\/\/www.webauthn.io\/<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires users to provide multiple forms of verification before gaining access to a system or application. This can include something they know, such as a password or personal identification number (PIN), something they have, such as a mobile phone or USB token, or something they are, such as a biometric trait like a fingerprint or retinal scan. By incorporating multiple factors, MFA significantly enhances security and helps to mitigate the risk of unauthorized access or data breaches.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Some common authentication factors include one-time passwords, authentication codes, special characters, and security questions. These additional layers of security help to protect against brute force attacks and unauthorized access attempts. Mobile devices are often used as a possession factor for authentication, with users receiving a code via SMS or using an authentication app on their phone. Location-based authentication adds an extra layer of security by verifying the geographical location of the user.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Overall, MFA plays a crucial role in enhancing security access and protecting sensitive information. Companies and organizations are increasingly adopting modern technologies like behavioral biometrics and adaptive authentication solutions to provide frictionless and secure access to their systems. By implementing strong authentication methods and access control systems, businesses can ensure the privacy and safety of their data and customer trust. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security method that requires multiple forms of identification to verify a user&#8217;s identity before granting access to a system or application. This can include something the user knows (like a password or security question), something they have (such as a mobile device or ATM card), or something they are (biometric traits like fingerprints or facial recognition). <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">By requiring multiple factors for authentication, MFA enhances security by reducing the risk of unauthorized access. According to research by Verizon, over 80% of data breaches could have been prevented with the use of MFA. Additionally, the National Institute of Standards and Technology (NIST) recommends the use of MFA as a best practice for securing online accounts and systems. Overall, MFA plays a crucial role in protecting sensitive data and preventing unauthorized access in today&#8217;s digital landscape.<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires more than one form of verification in order to access a system or application. This additional layer of security helps to better protect users from unauthorized access to their accounts and sensitive information. Source: www.csoonline.com<\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Some common factors used in MFA include possession factors, such as a mobile device or token, knowledge factors like passwords or security questions, and inherence factors like biometric verification. By combining these different factors, MFA enhances security and reduces the risk of unauthorized access, especially in remote or online environments. It is important for organizations to implement MFA to protect their users and sensitive data from cyber threats. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">Multi-factor authentication (MFA) is a security measure that requires multiple factors for users to verify their identity before gaining access to a system or application. These additional authentication factors can include something you have, such as a mobile phone or authenticator app code, something you know, like a password or personal security question, and something you are, such as biometric verification methods or voice authentication. <\/span><\/p>\n<p><span style=\"font-size: revert; color: initial;\">This multi-layered approach enhances security by reducing the risk of unauthorized access, as it is more difficult for hackers to breach multiple authentication methods. MFA is commonly used in corporate networks, online banking, and social media accounts to protect sensitive information from cyber threats. By integrating various authentication factors, MFA provides a higher level of protection for users and organizations against identity theft and unauthorized access to systems.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Multi-Factor_Authentication_MFA_Factors\"><\/span>Multi-Factor Authentication (MFA) Factors<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<table>\n<tbody>\n<tr>\n<th>Factor Type<\/th>\n<th>Description<\/th>\n<\/tr>\n<tr>\n<td>Knowledge Factor<\/td>\n<td>Information known to the user (e.g., password, security question)<\/td>\n<\/tr>\n<tr>\n<td>Possession Factor<\/td>\n<td>Physical item owned by the user (e.g., mobile phone, security token)<\/td>\n<\/tr>\n<tr>\n<td>Inherence Factor<\/td>\n<td>Biometric trait unique to the user (e.g., fingerprint, facial recognition)<\/td>\n<\/tr>\n<tr>\n<td>Time-Based Factor<\/td>\n<td>Verification code valid for a limited time period (e.g., SMS code, authenticator app code)<\/td>\n<\/tr>\n<tr>\n<td>Location-Based Factor<\/td>\n<td>Verifying user&#8217;s geographical location as an additional layer of security<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2 id=\"qa\"><span class=\"ez-toc-section\" id=\"Q_A\"><\/span>Q&amp;A<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Q: What is \u201cMulti Factor Authentication Something You \u200cHave\u201d?<br \/>\nA: Multi \u2063Factor Authentication Something You\u2064 Have is a way for websites and apps to make sure that you are who \u2064you say\u2063 you are. It makes it so that only you can access your account by using two or more\u2064 pieces of information, such as\u2063 a code,\u2062 a key,\u2063 or a physical item. \u2062This\u200b way, even if \u2062someone has your password, they won\u2019t be able to log into\u2064 your account without \u200cthe \u200dother piece of information.<\/p>\n<h2 id=\"outro\"><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span>Conclusion<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<div class=\"flex max-w-full flex-col flex-grow\">\n<div class=\"min-h-8 text-message flex w-full flex-col items-end gap-2 whitespace-normal break-words [.text-message+&amp;]:mt-5\" dir=\"auto\" data-message-author-role=\"assistant\" data-message-id=\"2c481c9e-a127-4cce-8882-bb1c6b676008\">\n<div class=\"flex w-full flex-col gap-1 empty:hidden first:pt-[3px]\">\n<div class=\"markdown prose w-full break-words dark:prose-invert light\">\n<p>Safeguard your online security with <a href=\"https:\/\/logmeonce.com\/\">LogMeOnce<\/a> by using multi-factor authentication today! Protect your online accounts and ensure your data is secure by creating your FREE LogMeOnce account. Experience the advantages of two-factor authentication and enjoy the peace of mind that comes with being safe online. Don\u2019t take risks\u2014implement LogMeOnce&#8217;s multi-factor authentication now!<\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n\n<div style=\"font-size: 0px; height: 0px; line-height: 0px; margin: 0; padding: 0; clear: both;\"><\/div>","protected":false},"excerpt":{"rendered":"<p>Multi-Factor Authentication (MFA) adds an extra layer of security by requiring something you have, like a mobile device. Create a FREE LogMeOnce account for Auto-login, SSO, Identity Theft Protection, and Dark Web Monitoring. Enhance your account safety today!<\/p>\n","protected":false},"author":17,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[19737],"tags":[3765,1294,3604,10933,781,21766],"class_list":["post-74394","post","type-post","status-publish","format-standard","hentry","category-two-factor-authentication","tag-data-protection-2","tag-authentication","tag-identity-management","tag-multi-factor-authentication","tag-security","tag-something-you-have"],"acf":[],"_links":{"self":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74394","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/users\/17"}],"replies":[{"embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/comments?post=74394"}],"version-history":[{"count":2,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74394\/revisions"}],"predecessor-version":[{"id":229264,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/posts\/74394\/revisions\/229264"}],"wp:attachment":[{"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/media?parent=74394"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/categories?post=74394"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/logmeonce.com\/resources\/wp-json\/wp\/v2\/tags?post=74394"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}