{"id":1498,"date":"2023-12-06T11:51:04","date_gmt":"2023-12-06T15:51:04","guid":{"rendered":"http:\/\/209.208.108.186\/?p=1498"},"modified":"2023-11-21T11:26:04","modified_gmt":"2023-11-21T15:26:04","slug":"are-you-leaving-your-small-business-web-use-security-door-open","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/","title":{"rendered":"Are you leaving your small business Web-use security door open?"},"content":{"rendered":"<p><a href=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1499\" src=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\" alt=\"\" width=\"500\" height=\"333\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400;\">There is so much to be concerned with when running a small business. <\/span><span style=\"font-weight: 400;\">Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running&#8211;all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider threats, unsanctioned cloud apps, BYOD . . . lets just say, the Internet usage risks are probably even higher than the front door being left open . . . wide open.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many small and midsized businesses (SMBs) are without full-time IT departments or even full-time IT personnel, making them a prime target for breaches. But SMBs tend to think they don\u2019t have the resources to handle this type of security, whether it be the financial consideration, personnel needed, or when hardware is preferred, limited space constraints. Since hackers know this, SMBs have to be proactive when it comes to Web-use security&#8211;nowadays, even more so than corporations.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The connection between the human and the Internet is a weak link, making it one of the leading access points into a system for a hacker. Whether it\u2019s from the employee clicking a Web link in an e-mail, clicking a malicious ad, or sharing company information with a cloud service, make sure to protect the business by managing that employee-Internet connection. Find a solution that allows you to easily and proactively monitor and secure your employees\u2019 Web activity. Your business is unique&#8211;finding a way to solve these issues and concerns will take a unique solution. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">A few tips for your Web-use security solution search:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><b>Find a vendor who will spend the time with you.<\/b><span style=\"font-weight: 400;\"> The cyber world has its own language. It\u2019s important to have a human being on the other end of the phone during the sales process, in customer service, and when you need technical support . . . yup, they still have human beings in technical support . . . go figure! Get with a company who wants to talk to you!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Of course, it doesn\u2019t help if that vendor doesn\u2019t have what you need so make sure you <\/span><b>list the top security priorities for your business.<\/b><span style=\"font-weight: 400;\"> Do you want to filter access to certain Web sites or categories such as social media, or do you want to limit time that an employee may spend on one site? Are you are more concerned with your guest Wi-Fi and BYOD or throttling bandwidth use? Don\u2019t get sold on something that doesn\u2019t meet at least your primary concerns. One solution does not always fit all . . . in today\u2019s cybersecurity world you need to focus on your specific business concerns. Just because an expensive, large scale, all-in-one network security solution or firewall has a Web-use add-on tool does not mean it will give you the pertinent, granular detail and control that you need to protect your mission-critical operations.<\/span><\/li>\n<li style=\"font-weight: 400;\"><b>Ask questions.<\/b><span style=\"font-weight: 400;\"> The vendor should understand that you excel at what you do, not what they do. Don\u2019t be intimidated by the security subject. Even those of us in this business spend a lot of time keeping up with the fast pace of cybersecurity. No question is unnecessary. If you think about it, then it is important to you and should be to the vendor too. Refer to Tip #1!<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Last tip for today . . . solutions come in many shapes and sizes. <\/span><b>Don\u2019t settle for something that doesn\u2019t fit your business.<\/b><span style=\"font-weight: 400;\"> Your business is special and unique. Your solution should fit and work in your environment without you constantly having to justify it and make it fit in.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Wavecrest can, and wants to, help you!<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Wavecrest provides Filtering and User Behavior Reporting solutions that fit your business! Find out more about our Cyfin and CyBlock deployments today. As a customer-centric company, Wavecrest focuses on the needs of each customer. Let us help secure your business with a solution that fits every business size, type, and configuration.<\/span><\/p>\n<p><b>About Wavecrest<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Trusted for over 25 years, Wavecrest Computing, headquartered in historic downtown Melbourne, FL, has provided commercial business and government clients with reliable, accurate Web-use management and User Behavior Analytic products since 1996. Managed Service Providers, IT specialists, HR professionals, and business managers trust Wavecrest\u2019s Cyfin and CyBlock products to manage employee Internet usage \u2014 managing and reporting on cloud services, reducing liability risks, improving productivity, saving bandwidth, and controlling costs. Wavecrest has commercial and government clients worldwide. For more information on the company, products, and partners, visit <\/span><a href=\"https:\/\/www.wavecrest.net\/\"><span style=\"font-weight: 400;\">https:\/\/www.wavecrest.net<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>There is so much to be concerned with when running a small business. Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running&#8211;all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[24,11,560,12,9,1],"tags":[298,420,101,119,232,540,5,6,134,562,140,374,20],"class_list":["post-1498","post","type-post","status-publish","format-standard","hentry","category-control-internet-access","category-cyblock","category-cyblock-mini-appliance","category-cyfin","category-security-threats","category-uncategorized","tag-bandwidth-management","tag-employee-monitoring","tag-employee-productivity","tag-employee-web-use","tag-employee-web-use-reports","tag-guest-wifi","tag-internet-filtering","tag-internet-monitoring","tag-malware","tag-mini","tag-web-filtering","tag-web-security","tag-web-use-reporting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are you leaving your small business Web-use security door open? - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are you leaving your small business Web-use security door open? - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"There is so much to be concerned with when running a small business. Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running&#8211;all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2023-12-06T15:51:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Are you leaving your small business Web-use security door open?\",\"datePublished\":\"2023-12-06T15:51:04+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\"},\"wordCount\":752,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\",\"keywords\":[\"bandwidth management\",\"employee monitoring\",\"employee productivity\",\"employee web use\",\"employee web use reports\",\"guest wifi\",\"internet filtering\",\"internet monitoring\",\"malware\",\"Mini\",\"web filtering\",\"web security\",\"web-use reporting\"],\"articleSection\":[\"Control Internet Access\",\"CyBlock\",\"CyBlock Mini Appliance\",\"Cyfin\",\"Security Threats\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\",\"name\":\"Are you leaving your small business Web-use security door open? - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\",\"datePublished\":\"2023-12-06T15:51:04+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are you leaving your small business Web-use security door open?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are you leaving your small business Web-use security door open? - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/","og_locale":"en_US","og_type":"article","og_title":"Are you leaving your small business Web-use security door open? - Wavecrest Blog","og_description":"There is so much to be concerned with when running a small business. Economic uncertainty, the cost of health insurance benefits, regulatory burdens, keeping mission-critical operations running&#8211;all add up to a stressful experience. Now security concerns include more than just locking the doors; it means everything digital too. And the risks? With ransomware, phishing, insider [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2023-12-06T15:51:04+00:00","og_image":[{"url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Are you leaving your small business Web-use security door open?","datePublished":"2023-12-06T15:51:04+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/"},"wordCount":752,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg","keywords":["bandwidth management","employee monitoring","employee productivity","employee web use","employee web use reports","guest wifi","internet filtering","internet monitoring","malware","Mini","web filtering","web security","web-use reporting"],"articleSection":["Control Internet Access","CyBlock","CyBlock Mini Appliance","Cyfin","Security Threats"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/","url":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/","name":"Are you leaving your small business Web-use security door open? - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg","datePublished":"2023-12-06T15:51:04+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#primaryimage","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2017\/05\/door-cyblock.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/are-you-leaving-your-small-business-web-use-security-door-open\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Are you leaving your small business Web-use security door open?"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1498","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=1498"}],"version-history":[{"count":3,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1498\/revisions"}],"predecessor-version":[{"id":1749,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/1498\/revisions\/1749"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=1498"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=1498"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=1498"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}