{"id":24355,"date":"2022-09-30T09:35:40","date_gmt":"2022-09-30T01:35:40","guid":{"rendered":"https:\/\/www.exabytes.sg\/blog\/?p=24355"},"modified":"2022-09-30T09:37:45","modified_gmt":"2022-09-30T01:37:45","slug":"data-breached-how-to-know-and-prevent","status":"publish","type":"post","link":"https:\/\/www.exabytes.sg\/blog\/data-breached-how-to-know-and-prevent\/","title":{"rendered":"How to Know If Your Data Has Been Breached?"},"content":{"rendered":"<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24367 size-full\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=696%2C364&#038;ssl=1\" alt=\"How to know if data has been data breached\" width=\"696\" height=\"364\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?w=1200&amp;ssl=1 1200w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=300%2C157&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=1024%2C536&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=768%2C402&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=696%2C364&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=1068%2C559&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=218%2C114&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?resize=803%2C420&amp;ssl=1 803w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Before we look at identifying a breach in data, let us understand what is a data breach.<\/p>\n<p><span style=\"font-weight: 400;\">A <\/span><b>data breach<\/b><span style=\"font-weight: 400;\"> \/ <\/span><b>account breach<\/b><span style=\"font-weight: 400;\"> is an incident where information is stolen or taken from a system without the knowledge or authorization of the system\u2019s owner.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Stolen data<\/a> or data breach may involve sensitive, proprietary, or confidential information such as credit card numbers, customer data, trade secrets, or matters of national security.<\/p>\n<p><span style=\"font-weight: 400;\">A <\/span><b>data breach <\/b><span style=\"font-weight: 400;\">can cause major damage to the target company\u2019s reputation due to a perceived \u2018betrayal of trust\u2019. Victims may also suffer financial losses depending on the kind of information stolen.\u00a0<\/span><\/p>\n<p>Most of the data leakage, data thefts, and account breaches are attributed to incidents of<a href=\"https:\/\/www.exabytes.sg\/blog\/how-to-protect-against-malware-attack\/\" target=\"_blank\" rel=\"noopener\"> hacking or malware attacks<\/a>.<\/p>\n<h2><span style=\"color: #0000ff;\"><strong>How Account Breaches Happen<\/strong><\/span><\/h2>\n<p>However, some other methods of data breaches, account breaches that are commonly documented include:<\/p>\n<h3><strong>Insider leak<\/strong><\/h3>\n<p>Where data breaches, data leakage and account details are leaked out by someone working inside the company. A trusted individual or person of authority with access privileges steals data.<\/p>\n<h3><strong>Payment Card fraud<\/strong><\/h3>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24356 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card.jpg?resize=696%2C464&#038;ssl=1\" alt=\"Payment card\" width=\"696\" height=\"464\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=1536%2C1024&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=2048%2C1365&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=696%2C464&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=1068%2C712&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=171%2C114&amp;ssl=1 171w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?resize=630%2C420&amp;ssl=1 630w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/payment-card-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Use of physical skimming devices to steal Payment card information which is a form of account breach.<\/p>\n<h3><strong>Loss or Theft<\/strong><\/h3>\n<p>Loss or Theft of Physical devices like laptops, desktops, pen drives, and other physical properties, leading to data breach.<\/p>\n<h3><span style=\"font-weight: 400;\"><strong>Unintended disclosure<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">\u00a0Done unknowingly through mistakes or negligence. Critical data gets exposed.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\"><strong>Unknown<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In some cases the actual <\/span>breach method is unknown, but causes several account breaches.<\/p>\n<p>Once the types of Data Breaches \/ Account Breaches are identified, they are classified based on the effect they may cause.<\/p>\n<h2><span style=\"color: #0000ff;\"><strong>How Data Breaches Happen<\/strong><\/span><\/h2>\n<p>Now in the above identified Data Breaches, we can classify them as sampled below:<\/p>\n<p><span style=\"font-weight: 400;\"><strong>Insider leak<\/strong> &#8211; Reputation<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Payment Card fraud<\/strong> &#8211; Financial\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Loss or Theft<\/strong> &#8211; Data &amp; Financial<\/span><\/p>\n<p><span style=\"font-weight: 400;\"><strong>Unintended Disclosure<\/strong> &#8211; Reputation, Financial<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Once these classifications are in place we can identify how to plug each area.\u00a0<\/span><\/p>\n<h2><span style=\"color: #333333;\"><strong>Few Examples of <\/strong><strong>Cyber-Attacks\u00a0<\/strong><\/span><\/h2>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Cyber-attacks<\/a><span style=\"font-weight: 400;\"> are known to cause <\/span>data breache<span style=\"font-weight: 400;\">s, here are some areas that we need to watch out for.\u00a0<\/span><\/p>\n<h3><strong>Phishing<\/strong><\/h3>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-23955 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing.jpg?resize=696%2C481&#038;ssl=1\" alt=\"Malware Phishing Virus\" width=\"696\" height=\"481\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1024%2C707&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=300%2C207&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=768%2C530&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1536%2C1061&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=2048%2C1414&amp;ssl=1 2048w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=218%2C150&amp;ssl=1 218w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=696%2C481&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=1068%2C738&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=165%2C114&amp;ssl=1 165w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=608%2C420&amp;ssl=1 608w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?resize=100%2C70&amp;ssl=1 100w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/antivirus-malware-phishing-scaled.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Engineered to fool you into causing a data leakage and data breach. Criminals are coaxed into handing over access to sensitive information or the data itself.<\/p>\n<h3><strong>Brute Force Attacks<\/strong><\/h3>\n<p><span style=\"font-weight: 400;\">Enlisting software tools to grab your passwords.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\"><strong>Malware<\/strong><\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Flaws or security gaps within the operating systems that are exploited to grab information while being completely undetected.\u00a0<\/span><\/p>\n<h2><span style=\"color: #333333;\"><strong>The Impacts of Data Breaches<\/strong><\/span><\/h2>\n<p>The damage a data breach can do:<\/p>\n<p><strong>For business organizations<\/strong> &#8211; it can devastate the organization\u2019s reputation and the financial bottom line.<\/p>\n<p>In future, these organizations will be more known for the data breach, then the actual business operations they are into.<\/p>\n<p><strong>For Government organizations<\/strong> &#8211; compromised data can mean data leakage exposing highly confidential information to foreign parties.<\/p>\n<p>Details related to Military operations, financial operations, political dealings, details on the essentials of the government that can lead to a national threat.<\/p>\n<p><strong>For individuals <\/strong>&#8211;\u00a0Data leakage can reveal anything from social security numbers, credit card details, banking information and others.<\/p>\n<p>These can result in illegal activities done under your identity.<\/p>\n<h2><span style=\"color: #333333;\"><strong>How To Prevent Data Breaches<\/strong><\/span><\/h2>\n<p><img data-recalc-dims=\"1\" decoding=\"async\" class=\"alignnone wp-image-24190 size-large\" src=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=696%2C392&#038;ssl=1\" alt=\"cybersecurity prevent ddos attacks\" width=\"696\" height=\"392\" srcset=\"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=1024%2C576&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=300%2C169&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=768%2C432&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=1536%2C864&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=696%2C392&amp;ssl=1 696w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=1068%2C601&amp;ssl=1 1068w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=203%2C114&amp;ssl=1 203w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?resize=747%2C420&amp;ssl=1 747w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?w=1920&amp;ssl=1 1920w, https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/cybersecurity-prevent-ddos-attacks.jpg?w=1392&amp;ssl=1 1392w\" sizes=\"(max-width: 696px) 100vw, 696px\" \/><\/p>\n<p>Prevent being a Data Breach victim.<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Data breach<span style=\"font-weight: 400;\"> prevention<\/span><\/a><span style=\"font-weight: 400;\"> needs to include everyone at all levels \u2014 from end-users to IT personnel, and all people in between.<\/span><\/p>\n<p><strong>There are some best practices to be followed to prevent a data breach &#8211;<\/strong><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Updating the Operating systems and applying the latest patches<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Use high grade encryption for sensitive data<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Upgrading devices at regular schedules<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Enforce BYOD security policies<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Enforce strong credentials and multi-factor authentication<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Educating employees on Data leakage and Data Theft Threats<\/li>\n<\/ul>\n<p>One term that we always come across while looking at data breaches is Social Engineering.<\/p>\n<p>This is a manipulation technique that exploits human error to gain private information, accesses or valuables.<\/p>\n<p>Such attacks that cause account breaches, can happen online, in-person, or via any other interactions.<\/p>\n<p>Such scams are always built around how people think and act. Since these are based on Human behaviour, it can manipulate the behaviour into giving away critical information.<\/p>\n<p><strong>The focus of social engineering is:<\/strong><\/p>\n<p><strong>Sabotage<\/strong> &#8211; disrupting or corrupting data to create damage or havoc with data leaks.<\/p>\n<p><strong>Data theft<\/strong> &#8211; Obtain valuable information and use it against you, exploit your weakness<\/p>\n<p>Related: <a href=\"https:\/\/www.horangi.com\/horangipedia\/what-is-social-engineering#:~:text=Typically%2C%20Social%20Engineering%20attacks%20are,like%20information%2C%20access%2C%20or%20money\" target=\"_blank\" rel=\"noopener\">What is Sabotage in Social Engineering Attacks<\/a>?<\/p>\n<p>What should concern you the most is account breach? There are certain sites that will let you check if your identity has been stolen \/ compromised.<\/p>\n<p>One such site is the f-secure one, where you can place your email account and a complete report will be sent based on your email address exposure and data leakage.<\/p>\n<p>The best way to protect your identity online is to <strong>secure your private information by using strong passwords<\/strong> and <strong>being careful what you share across different services<\/strong>.<\/p>\n<p>When passwords are compromised, it means that the services you use with the passwords are all exposed.<\/p>\n<p>In many cases, users can go on for years without realizing that their passwords are compromised and private stuff made public.<\/p>\n<h2><span style=\"color: #333333;\"><strong>What Makes a Strong Password?\u00a0<\/strong><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">A <a href=\"https:\/\/support.exabytes.sg\/en\/support\/solutions\/articles\/14000100289-how-to-make-sure-i-use-a-strong-password-tool-\" target=\"_blank\" rel=\"noopener\">strong password<\/a> is a long one, making it difficult to guess. It is important to have separate passwords for each service. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Thereby, if one service is a victim, the other services are not affected.\u00a0<\/span><\/p>\n<p>This will help against data leakage.<\/p>\n<p><strong>Now, the question is how would you detect an account breach?<\/strong><\/p>\n<p>Always look for the below to detect an account breach or data breach<\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Suspicious network activity (strange file transfers \/ login attempts)<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Sudden changes to critical infrastructure or systems, passwords or accounts<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Suspicious files in your system that may not be encrypted<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Suspicious banking activities and transactions<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">In-explainable loss of access to the network, email or bank accounts<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Slow internet connections or network accesses.<\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\">Warnings in the browsers, anti-virus tools<\/li>\n<\/ul>\n<p>There are sites that will let you know if your email addresses have been pawned and data leakage. You can check for both email addresses and international phone numbers.<\/p>\n<p>Here you can get complete information if your email address has been used elsewhere, or even copy and pasted.<\/p>\n<p>So the primary goal is to ensure that you do not share your email addresses, phone numbers, or contact details with people whom you do not trust.<\/p>\n<p><!--more--><\/p>\n<p>For more information of the areas of focus, do visit us at the page: <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Acronis Cyber Protect<\/a><\/p>\n<p>On our side, we have a single solution to protect your data: <a href=\"https:\/\/www.exabytes.sg\/acronis\/cyber-protect\" target=\"_blank\" rel=\"noopener\">Acronis Ransomware Protection<\/a><\/p>\n<p>If you would like to know what more can be done about your data and your websites \/ applications, do connect with us at here.<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/contact\" target=\"_blank\" rel=\"noopener\"><span class=\"td_btn td_btn_md td_default_btn\">Contact Us<\/span><\/a><\/p>\n<p>Related articles:<\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/phishing-mail-pretending-sheep\/\" target=\"_blank\" rel=\"noopener\">What is Phishing Mail?<\/a><\/p>\n<p><a href=\"https:\/\/www.exabytes.sg\/blog\/how-to-protect-against-malware-attack\/\" target=\"_blank\" rel=\"noopener\">What is Malware Attack?<\/a><\/p>\n<p><span class=\"embed-youtube\" style=\"text-align:center; display: block;\"><iframe class=\"youtube-player\" width=\"696\" height=\"392\" src=\"https:\/\/www.youtube.com\/embed\/fniCePCSnFY?version=3&#038;rel=1&#038;showsearch=0&#038;showinfo=1&#038;iv_load_policy=1&#038;fs=1&#038;hl=en-US&#038;autohide=2&#038;wmode=transparent\" allowfullscreen=\"true\" style=\"border:0;\" sandbox=\"allow-scripts allow-same-origin allow-popups allow-presentation allow-popups-to-escape-sandbox\"><\/iframe><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Before we look at identifying a breach in data, let us understand what is a data breach. A data breach \/ account breach is an incident where information is stolen or taken from a system without the knowledge or authorization of the system\u2019s owner.\u00a0 Stolen data or data breach may involve sensitive, proprietary, or confidential [&hellip;]<\/p>\n","protected":false},"author":75,"featured_media":24367,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[293],"tags":[540,488,196],"class_list":{"0":"post-24355","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-security-backup","8":"tag-cybersecurity","9":"tag-digital-security","10":"tag-security"},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.exabytes.sg\/blog\/wp-content\/uploads\/2022\/09\/data-breaches.jpg?fit=1200%2C628&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/pbHhPQ-6kP","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/users\/75"}],"replies":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/comments?post=24355"}],"version-history":[{"count":7,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24355\/revisions"}],"predecessor-version":[{"id":24373,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/posts\/24355\/revisions\/24373"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media\/24367"}],"wp:attachment":[{"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/media?parent=24355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/categories?post=24355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.exabytes.sg\/blog\/wp-json\/wp\/v2\/tags?post=24355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}