{"id":409,"date":"2012-01-31T16:01:06","date_gmt":"2012-01-31T20:01:06","guid":{"rendered":"http:\/\/blog.wavecrestcomputing.com\/?p=409"},"modified":"2013-02-26T17:30:48","modified_gmt":"2013-02-26T21:30:48","slug":"monitoring-internet-usage-from-the-it-dept","status":"publish","type":"post","link":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/","title":{"rendered":"Monitoring Internet Usage &#8230; From the IT Department"},"content":{"rendered":"<p>During July, August, and September of 2011, <a title=\"Commtouch\" href=\"https:\/\/www.commtouch.com\/\" target=\"_blank\">Commtouch<\/a> assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.\u00a0 The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content.<\/p>\n<p>What were the most-visited categories by your employees during 2011?<\/p>\n<p>Are you currently monitoring and\/or blocking the existing Spyware\/Malicious, Phishing\/Fraud, Public Proxy, and Hacking categories to help protect your network?<\/p>\n<p style=\"text-align: center;\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter  wp-image-418\" title=\"Top Website Categories Infected with Malware\" src=\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\" alt=\"Source: Commtouch\" width=\"481\" height=\"164\" \/><\/p>\n<p>In today\u2019s wired workplace, internet security and bandwidth consumption are top concerns for IT professionals while employee productivity and legal liability ail management and HR professionals.\u00a0 As a major contributor to the Web-use management effort, IT typically becomes deeply involved in planning, testing, selecting, installing, and administering Internet monitoring software.\u00a0 With the different departments playing a role in deciding on the best product to fit their vast needs, most are left without a solution.\u00a0 Fortunately, Wavecrest\u2019s products have been <a title=\"Wavecrest Customer Reviews\" href=\"https:\/\/www.wavecrest.net\/company\/customers.html?utm_source=Wordpress&amp;utm_medium=reviewed%2Bby%2Bour%2Bcustomers%2Blink&amp;utm_campaign=Monitoring%2BInternet%2BUsage%2BFrom%2Bthe%2BIT%2BDept\" target=\"_blank\">reviewed by our customers<\/a> as meeting each role\u2019s needs most effectively, offering manager-ready, easy-to-interpret reports that can be accessed without the IT personnel in addition to providing a robust, truly scalable IT-friendly remedy.<\/p>\n<p>With <a title=\"Wavecrest Computing\" href=\"https:\/\/www.wavecrest.net\/?utm_source=Wordpress&amp;utm_medium=Wavecrest%2BComputing&amp;utm_campaign=Monitoring%2BInternet%2BUsage%2BFrom%2Bthe%2BIT%2BDept\" target=\"_blank\">Wavecrest Computing<\/a>, customers have the insight needed to proactively monitor \/ block the notorious malicious sites based on custom categories, the Wavecrest Control List, and a real-time deep packet analysis process.\u00a0 Plus, <a title=\"Wavecrest Computing Report Templates\" href=\"https:\/\/www.wavecrest.net\/products\/reportdescriptions.html?utm_source=Wordpress&amp;utm_medium=our%2B19%2Bcomprehensive%2Btemplates&amp;utm_campaign=Monitoring%2BInternet%2BUsage%2BFrom%2Bthe%2BIT%2BDept\" target=\"_blank\">our 19 comprehensive templates<\/a> provide a variety of summarized and detailed Web-use activity reports on users, groups, categories, sites, acceptability ratings, and bandwidth consumption.\u00a0 Conveniently import your current Web Use Policy to easily customize or classify categories, implement abuse thresholding, and monitor employee productivity while our Administrator and Operator Accounts allow for non-IT personnel to create and obtain their role-specific reports.<\/p>\n<p>While serving a diverse mixture of commercial businesses, industrial firms, government agencies, military units, educational institutions, and non-profit organizations since 1996, our products continue to present the most up-to-date, proactive coverage in line with the one factor that underlies all Web-use management issues, human online activity. Wavecrest\u2019s managers and developers understand human resource management well and we use that knowledge to develop features that prevent productivity losses, legal liability problems, network issues, and unnecessary costs.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.\u00a0 The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content. What were [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51,77,120,24,11,106,109,89,12,72,37,9,60,18,16],"tags":[212,88,32,101,119,5,6,499,46,22,131,497,133],"class_list":["post-409","post","type-post","status-publish","format-standard","hentry","category-acceptable-use-policy","category-bandwidth-issues","category-block-web-access","category-control-internet-access","category-cyblock","category-cyblock-appliance","category-cyblock-isa","category-cyblock-proxy","category-cyfin","category-legal-liability","category-productivity-concerns","category-security-threats","category-wave-news","category-wavecrest-computing","category-web-use-management","tag-bandwidth-consumption","tag-cyfin-proxy","tag-cyfin-reporter","tag-employee-productivity","tag-employee-web-use","tag-internet-filtering","tag-internet-monitoring","tag-legal-liability","tag-monitor-web-access","tag-monitoring-software","tag-network-security","tag-security-threats","tag-wavecrest-control-list"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Monitoring Internet Usage ... From the IT Department - Wavecrest Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog\" \/>\n<meta property=\"og:description\" content=\"During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.\u00a0 The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content. What were [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\" \/>\n<meta property=\"og:site_name\" content=\"Wavecrest Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/WebFiltering\" \/>\n<meta property=\"article:published_time\" content=\"2012-01-31T20:01:06+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2013-02-26T21:30:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:site\" content=\"@wavecrestnet\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\"},\"headline\":\"Monitoring Internet Usage &#8230; From the IT Department\",\"datePublished\":\"2012-01-31T20:01:06+00:00\",\"dateModified\":\"2013-02-26T21:30:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\"},\"wordCount\":373,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\",\"keywords\":[\"bandwidth consumption\",\"cyfin proxy\",\"cyfin reporter\",\"employee productivity\",\"employee web use\",\"internet filtering\",\"internet monitoring\",\"Legal Liability\",\"monitor web access\",\"monitoring software\",\"network security\",\"Security Threats\",\"wavecrest control list\"],\"articleSection\":[\"Acceptable Use Policy\",\"Bandwidth Issues\",\"block web access\",\"Control Internet Access\",\"CyBlock\",\"CyBlock Appliance\",\"CyBlock ISA TMG\",\"CyBlock Software\",\"Cyfin\",\"Legal Liability\",\"Productivity Concerns\",\"Security Threats\",\"Wave News\",\"Wavecrest Computing\",\"web-use management\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\",\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\",\"name\":\"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog\",\"isPartOf\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\",\"datePublished\":\"2012-01-31T20:01:06+00:00\",\"dateModified\":\"2013-02-26T21:30:48+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage\",\"url\":\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\",\"contentUrl\":\"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/blog.wavecrest.net\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Monitoring Internet Usage &#8230; From the IT Department\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/blog.wavecrest.net\/#website\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"name\":\"Wavecrest Blog\",\"description\":\"The Latest news, tips and resources straight from the Wavecrest team.\",\"publisher\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/blog.wavecrest.net\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/blog.wavecrest.net\/#organization\",\"name\":\"Wavecrest Blog\",\"url\":\"https:\/\/blog.wavecrest.net\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"contentUrl\":\"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png\",\"width\":1210,\"height\":765,\"caption\":\"Wavecrest Blog\"},\"image\":{\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/WebFiltering\",\"https:\/\/x.com\/wavecrestnet\",\"https:\/\/www.linkedin.com\/company\/wavecrest-computing\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/","og_locale":"en_US","og_type":"article","og_title":"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog","og_description":"During July, August, and September of 2011, Commtouch assessed categories of Web sites most likely to be home to malware, below are the top ranking offenders.\u00a0 The Portals category includes those sites offering free hosting which are often abused to publish malware and phishing content or will redirect to sites with this content. What were [&hellip;]","og_url":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/","og_site_name":"Wavecrest Blog","article_publisher":"https:\/\/www.facebook.com\/WebFiltering","article_published_time":"2012-01-31T20:01:06+00:00","article_modified_time":"2013-02-26T21:30:48+00:00","og_image":[{"url":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_creator":"@wavecrestnet","twitter_site":"@wavecrestnet","twitter_misc":{"Written by":"admin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#article","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/"},"author":{"name":"admin","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc"},"headline":"Monitoring Internet Usage &#8230; From the IT Department","datePublished":"2012-01-31T20:01:06+00:00","dateModified":"2013-02-26T21:30:48+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/"},"wordCount":373,"commentCount":0,"publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg","keywords":["bandwidth consumption","cyfin proxy","cyfin reporter","employee productivity","employee web use","internet filtering","internet monitoring","Legal Liability","monitor web access","monitoring software","network security","Security Threats","wavecrest control list"],"articleSection":["Acceptable Use Policy","Bandwidth Issues","block web access","Control Internet Access","CyBlock","CyBlock Appliance","CyBlock ISA TMG","CyBlock Software","Cyfin","Legal Liability","Productivity Concerns","Security Threats","Wave News","Wavecrest Computing","web-use management"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/","url":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/","name":"Monitoring Internet Usage ... From the IT Department - Wavecrest Blog","isPartOf":{"@id":"https:\/\/blog.wavecrest.net\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage"},"image":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg","datePublished":"2012-01-31T20:01:06+00:00","dateModified":"2013-02-26T21:30:48+00:00","breadcrumb":{"@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#primaryimage","url":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg","contentUrl":"https:\/\/blog.wavecrestcomputing.com\/wp-content\/uploads\/2012\/01\/Commtouch-Malware-Categories1.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.wavecrest.net\/index.php\/monitoring-internet-usage-from-the-it-dept\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.wavecrest.net\/"},{"@type":"ListItem","position":2,"name":"Monitoring Internet Usage &#8230; From the IT Department"}]},{"@type":"WebSite","@id":"https:\/\/blog.wavecrest.net\/#website","url":"https:\/\/blog.wavecrest.net\/","name":"Wavecrest Blog","description":"The Latest news, tips and resources straight from the Wavecrest team.","publisher":{"@id":"https:\/\/blog.wavecrest.net\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.wavecrest.net\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.wavecrest.net\/#organization","name":"Wavecrest Blog","url":"https:\/\/blog.wavecrest.net\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/","url":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","contentUrl":"https:\/\/blog.wavecrest.net\/wp-content\/uploads\/2015\/08\/CF_Full_F.png","width":1210,"height":765,"caption":"Wavecrest Blog"},"image":{"@id":"https:\/\/blog.wavecrest.net\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/WebFiltering","https:\/\/x.com\/wavecrestnet","https:\/\/www.linkedin.com\/company\/wavecrest-computing"]},{"@type":"Person","@id":"https:\/\/blog.wavecrest.net\/#\/schema\/person\/49694141f524c27bbdfca11c590820cc","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/57312a01ee193eba72681938d65d35e991afb7e806c02d57f63579f2d73c1536?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/blog.wavecrest.net\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/409","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/comments?post=409"}],"version-history":[{"count":25,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/409\/revisions"}],"predecessor-version":[{"id":430,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/posts\/409\/revisions\/430"}],"wp:attachment":[{"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/media?parent=409"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/categories?post=409"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.wavecrest.net\/index.php\/wp-json\/wp\/v2\/tags?post=409"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}