{"id":1596,"date":"2020-05-08T17:23:56","date_gmt":"2020-05-08T21:23:56","guid":{"rendered":"https:\/\/www.gocomputek.com\/?p=1596"},"modified":"2021-04-09T11:48:34","modified_gmt":"2021-04-09T15:48:34","slug":"password-security-is-security","status":"publish","type":"post","link":"https:\/\/www.gocomputek.com\/password-security-is-security\/","title":{"rendered":"Password Security is Security"},"content":{"rendered":"\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t\t
\n\t\t\t
\n\t\t\t\t\t\t
\n\t\t\t\t
\n\t\t\t\t\t\t\t

If you\u2019ve used <\/span>Dropbox<\/a> or <\/span>LinkedIn<\/a> in the past few years, chances are your password is out there in the underbelly of the dark web. Last January, Troy Hunt published what he called <\/span>Data Collection #1<\/a>, a list of hacked emails and passwords. These contained 772,904,991 email addresses and 21,222,975 passwords. Later that same month, other researchers obtained and analyzed an additional vast database called Collections #2\u20135. The total was 845 gigabytes of stolen data and 25 billion records in all. At the end of the day, analysts at the <\/span>Hasso Plattner Institute<\/a> in Potsdam, Germany, found that the total haul is close to three times the size of the Collection #1 batch.<\/span><\/p>\n

How is this relevant to me?<\/span><\/h4>\n

Most of the emails and passwords are collections of old data breaches. The breaches typically come from Yahoo!, LinkedIn, and Dropbox. This information got circulated over 1,000 times. The immediate threat associated with a particular email address is low. However, individuals who use the same password for multiple sites are at risk. Then, hackers will use the same stolen password to break into multiple accounts. <\/span>Credential stuffing<\/a> is the name for using passwords for various sites. Unfortunately, this is true even when the type of account is varied (social media to mobile banking). You can use Hasso Plattner Institute\u2019s <\/span>tool<\/a> to\u00a0check if your username and passwords have been leaked.<\/span><\/p>\n

What Should I do?<\/span><\/h4>\n

Protecting your passwords by using <\/span>multi-factor authentication<\/a> wherever possible has never been more important. The strongest passwords are random strings of letters, numbers and symbols of eight or more characters. In addition, unique passwords are essential. Using a unique passwords means that you use a different password for every site. It is equally important to Keep track of these passwords. Additionally, we recommend using a password manager, like <\/span>Lastpass<\/a> and <\/span>Enpass<\/a>. These apps and other like them, create random, unique passwords for every site you use and store them securely.<\/span><\/p>\n

The same tactics for personal password safety apply to large organizations as well. A recent attack on a large firm by a new ransomware called \u201c<\/span>LockBit<\/a>\u201d illustrates this point. <\/span>ArsTechnica reports<\/a> that \u201cthe attackers [\u2026] used a list of words in hopes of gaining access to one of the [firm\u2019s] accounts. Eventually, they hit the jackpot: an administrative account that had free rein over the entire network. Then, the weak account password, combined with the lack of multifactor authentication protection, gave the attackers all the system rights they needed.\u201d Unfortunately for the company in question, they had not done a recent back up. They were forced to either pay out the ransom or lose all their data. They chose the former. This attack highlights the absolute need for unique, strong passwords and multifactor authentication.<\/span><\/p>\n

The Solution is Clear<\/span><\/h4>\n

The cautionary reality of this recent attack sends a clear message: strong, unique passwords and multi-factor authentication can save an organization\u2019s data. As a result, it preserves their profit margin. No one person and no <\/span>company<\/a>, no matter how big, is immune to cyberattacks. Password protection is the <\/span>front line of defense<\/a> for cyber security. For your convenience, <\/span>Managed Service Providers<\/a> (MSPs) and in-house IT departments should ensure that all users are abiding by the highest possible password safety standards.<\/span><\/p>\n

Don\u2019t wait until it\u2019s too late. If you would like to schedule a free <\/span>security assessment<\/a> for your organization, give us a call. Keeping data safe and systems operational is our passion! We look forward to <\/span>hearing from you<\/a>.<\/span><\/p>\n

<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"

If you\u2019ve used Dropbox or LinkedIn in the past few years, chances are your password is out there in the underbelly of the dark web. Last January, Troy Hunt published what he called Data Collection #1, a list of hacked emails and passwords. These contained 772,904,991 email addresses and 21,222,975 passwords. Later that same month, […]<\/p>\n","protected":false},"author":4,"featured_media":1827,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"ocean_post_layout":"","ocean_both_sidebars_style":"","ocean_both_sidebars_content_width":0,"ocean_both_sidebars_sidebars_width":0,"ocean_sidebar":"","ocean_second_sidebar":"","ocean_disable_margins":"enable","ocean_add_body_class":"","ocean_shortcode_before_top_bar":"","ocean_shortcode_after_top_bar":"","ocean_shortcode_before_header":"","ocean_shortcode_after_header":"","ocean_has_shortcode":"","ocean_shortcode_after_title":"","ocean_shortcode_before_footer_widgets":"","ocean_shortcode_after_footer_widgets":"","ocean_shortcode_before_footer_bottom":"","ocean_shortcode_after_footer_bottom":"","ocean_display_top_bar":"default","ocean_display_header":"default","ocean_header_style":"","ocean_center_header_left_menu":"","ocean_custom_header_template":"","ocean_custom_logo":0,"ocean_custom_retina_logo":0,"ocean_custom_logo_max_width":0,"ocean_custom_logo_tablet_max_width":0,"ocean_custom_logo_mobile_max_width":0,"ocean_custom_logo_max_height":0,"ocean_custom_logo_tablet_max_height":0,"ocean_custom_logo_mobile_max_height":0,"ocean_header_custom_menu":"","ocean_menu_typo_font_family":"","ocean_menu_typo_font_subset":"","ocean_menu_typo_font_size":0,"ocean_menu_typo_font_size_tablet":0,"ocean_menu_typo_font_size_mobile":0,"ocean_menu_typo_font_size_unit":"px","ocean_menu_typo_font_weight":"","ocean_menu_typo_font_weight_tablet":"","ocean_menu_typo_font_weight_mobile":"","ocean_menu_typo_transform":"","ocean_menu_typo_transform_tablet":"","ocean_menu_typo_transform_mobile":"","ocean_menu_typo_line_height":0,"ocean_menu_typo_line_height_tablet":0,"ocean_menu_typo_line_height_mobile":0,"ocean_menu_typo_line_height_unit":"","ocean_menu_typo_spacing":0,"ocean_menu_typo_spacing_tablet":0,"ocean_menu_typo_spacing_mobile":0,"ocean_menu_typo_spacing_unit":"","ocean_menu_link_color":"","ocean_menu_link_color_hover":"","ocean_menu_link_color_active":"","ocean_menu_link_background":"","ocean_menu_link_hover_background":"","ocean_menu_link_active_background":"","ocean_menu_social_links_bg":"","ocean_menu_social_hover_links_bg":"","ocean_menu_social_links_color":"","ocean_menu_social_hover_links_color":"","ocean_disable_title":"default","ocean_disable_heading":"default","ocean_post_title":"","ocean_post_subheading":"","ocean_post_title_style":"","ocean_post_title_background_color":"","ocean_post_title_background":0,"ocean_post_title_bg_image_position":"","ocean_post_title_bg_image_attachment":"","ocean_post_title_bg_image_repeat":"","ocean_post_title_bg_image_size":"","ocean_post_title_height":0,"ocean_post_title_bg_overlay":0.5,"ocean_post_title_bg_overlay_color":"","ocean_disable_breadcrumbs":"default","ocean_breadcrumbs_color":"","ocean_breadcrumbs_separator_color":"","ocean_breadcrumbs_links_color":"","ocean_breadcrumbs_links_hover_color":"","ocean_display_footer_widgets":"default","ocean_display_footer_bottom":"default","ocean_custom_footer_template":"","footnotes":"","ocean_post_oembed":"","ocean_post_self_hosted_media":"","ocean_post_video_embed":"","ocean_link_format":"","ocean_link_format_target":"self","ocean_quote_format":"","ocean_quote_format_link":"post","ocean_gallery_link_images":"on","ocean_gallery_id":[]},"categories":[206],"tags":[66,67,68,69,70,11],"yoast_head":"\nPassword Security is Security - GoComputek IT Managed Services<\/title>\n<meta name=\"description\" content=\"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.gocomputek.com\/password-security-is-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Security is Security - GoComputek IT Managed Services\" \/>\n<meta property=\"og:description\" content=\"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.gocomputek.com\/password-security-is-security\/\" \/>\n<meta property=\"og:site_name\" content=\"GoComputek: Managed IT Services and Support in Miami\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/gocomputek\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-08T21:23:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-04-09T15:48:34+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1709\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"stellamaris\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@gocomputek\" \/>\n<meta name=\"twitter:site\" content=\"@gocomputek\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"stellamaris\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/\"},\"author\":{\"name\":\"stellamaris\",\"@id\":\"https:\/\/www.gocomputek.com\/#\/schema\/person\/0fef306cd2e6c2df1daf0de62825e5e7\"},\"headline\":\"Password Security is Security\",\"datePublished\":\"2020-05-08T21:23:56+00:00\",\"dateModified\":\"2021-04-09T15:48:34+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/\"},\"wordCount\":581,\"publisher\":{\"@id\":\"https:\/\/www.gocomputek.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg\",\"keywords\":[\"Credential Stuffing\",\"multi-factor authentication\",\"multifactor authentication\",\"Password\",\"password security\",\"strong password\"],\"articleSection\":[\"Informational\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/\",\"url\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/\",\"name\":\"Password Security is Security - GoComputek IT Managed Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.gocomputek.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg\",\"datePublished\":\"2020-05-08T21:23:56+00:00\",\"dateModified\":\"2021-04-09T15:48:34+00:00\",\"description\":\"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.gocomputek.com\/password-security-is-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage\",\"url\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg\",\"contentUrl\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg\",\"width\":2560,\"height\":1709,\"caption\":\"Password insecure alert, unrecognizable computer hacker stealing personal data, internet cyber crime concept.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.gocomputek.com\/password-security-is-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.gocomputek.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Password Security is Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.gocomputek.com\/#website\",\"url\":\"https:\/\/www.gocomputek.com\/\",\"name\":\"GoComputek: Managed IT Services and Support in Miami\",\"description\":\"Miami's Premier IT Services and Managed Services Provider\",\"publisher\":{\"@id\":\"https:\/\/www.gocomputek.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.gocomputek.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.gocomputek.com\/#organization\",\"name\":\"GoComputek LLC\",\"url\":\"https:\/\/www.gocomputek.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gocomputek.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/03\/GoComputek-Logo-Final-Version-BLACK-256x96-1.png\",\"contentUrl\":\"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/03\/GoComputek-Logo-Final-Version-BLACK-256x96-1.png\",\"width\":256,\"height\":96,\"caption\":\"GoComputek LLC\"},\"image\":{\"@id\":\"https:\/\/www.gocomputek.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/gocomputek\",\"https:\/\/twitter.com\/gocomputek\",\"https:\/\/www.instagram.com\/gocomputek\/\",\"https:\/\/www.linkedin.com\/company\/gocomputek\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.gocomputek.com\/#\/schema\/person\/0fef306cd2e6c2df1daf0de62825e5e7\",\"name\":\"stellamaris\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.gocomputek.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/daf7d23444ed1388193d66a1c6a98e6e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/daf7d23444ed1388193d66a1c6a98e6e?s=96&d=mm&r=g\",\"caption\":\"stellamaris\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Password Security is Security - GoComputek IT Managed Services","description":"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.gocomputek.com\/password-security-is-security\/","og_locale":"en_US","og_type":"article","og_title":"Password Security is Security - GoComputek IT Managed Services","og_description":"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.","og_url":"https:\/\/www.gocomputek.com\/password-security-is-security\/","og_site_name":"GoComputek: Managed IT Services and Support in Miami","article_publisher":"https:\/\/www.facebook.com\/gocomputek","article_published_time":"2020-05-08T21:23:56+00:00","article_modified_time":"2021-04-09T15:48:34+00:00","og_image":[{"width":2560,"height":1709,"url":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg","type":"image\/jpeg"}],"author":"stellamaris","twitter_card":"summary_large_image","twitter_creator":"@gocomputek","twitter_site":"@gocomputek","twitter_misc":{"Written by":"stellamaris","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#article","isPartOf":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/"},"author":{"name":"stellamaris","@id":"https:\/\/www.gocomputek.com\/#\/schema\/person\/0fef306cd2e6c2df1daf0de62825e5e7"},"headline":"Password Security is Security","datePublished":"2020-05-08T21:23:56+00:00","dateModified":"2021-04-09T15:48:34+00:00","mainEntityOfPage":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/"},"wordCount":581,"publisher":{"@id":"https:\/\/www.gocomputek.com\/#organization"},"image":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg","keywords":["Credential Stuffing","multi-factor authentication","multifactor authentication","Password","password security","strong password"],"articleSection":["Informational"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/","url":"https:\/\/www.gocomputek.com\/password-security-is-security\/","name":"Password Security is Security - GoComputek IT Managed Services","isPartOf":{"@id":"https:\/\/www.gocomputek.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage"},"image":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg","datePublished":"2020-05-08T21:23:56+00:00","dateModified":"2021-04-09T15:48:34+00:00","description":"Protect your business with the best practices for Password Security. Learn how to be responsible with your data using IT Managed Service Providers.","breadcrumb":{"@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.gocomputek.com\/password-security-is-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#primaryimage","url":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg","contentUrl":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/06\/9-Password-Login-scaled-1.jpeg","width":2560,"height":1709,"caption":"Password insecure alert, unrecognizable computer hacker stealing personal data, internet cyber crime concept."},{"@type":"BreadcrumbList","@id":"https:\/\/www.gocomputek.com\/password-security-is-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.gocomputek.com\/"},{"@type":"ListItem","position":2,"name":"Password Security is Security"}]},{"@type":"WebSite","@id":"https:\/\/www.gocomputek.com\/#website","url":"https:\/\/www.gocomputek.com\/","name":"GoComputek: Managed IT Services and Support in Miami","description":"Miami's Premier IT Services and Managed Services Provider","publisher":{"@id":"https:\/\/www.gocomputek.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.gocomputek.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.gocomputek.com\/#organization","name":"GoComputek LLC","url":"https:\/\/www.gocomputek.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gocomputek.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/03\/GoComputek-Logo-Final-Version-BLACK-256x96-1.png","contentUrl":"https:\/\/www.gocomputek.com\/wp-content\/uploads\/2020\/03\/GoComputek-Logo-Final-Version-BLACK-256x96-1.png","width":256,"height":96,"caption":"GoComputek LLC"},"image":{"@id":"https:\/\/www.gocomputek.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/gocomputek","https:\/\/twitter.com\/gocomputek","https:\/\/www.instagram.com\/gocomputek\/","https:\/\/www.linkedin.com\/company\/gocomputek"]},{"@type":"Person","@id":"https:\/\/www.gocomputek.com\/#\/schema\/person\/0fef306cd2e6c2df1daf0de62825e5e7","name":"stellamaris","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.gocomputek.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/daf7d23444ed1388193d66a1c6a98e6e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/daf7d23444ed1388193d66a1c6a98e6e?s=96&d=mm&r=g","caption":"stellamaris"}}]}},"_links":{"self":[{"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/posts\/1596"}],"collection":[{"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/comments?post=1596"}],"version-history":[{"count":0,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/posts\/1596\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/media\/1827"}],"wp:attachment":[{"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/media?parent=1596"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/categories?post=1596"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.gocomputek.com\/wp-json\/wp\/v2\/tags?post=1596"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}