{"id":1398,"date":"2017-07-11T11:52:15","date_gmt":"2017-07-11T16:52:15","guid":{"rendered":"https:\/\/www.convergedsystems.com\/blog\/?p=1398"},"modified":"2018-10-09T11:54:40","modified_gmt":"2018-10-09T16:54:40","slug":"keep-voip-system-secure","status":"publish","type":"post","link":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/","title":{"rendered":"How to Keep Your VoIP System Secure"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1098\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg\" alt=\"benefits of voip\" width=\"300\" height=\"225\" srcset=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg 300w, https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-1024x768.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Telecom systems have evolved greatly along with technology in general. Now, thanks to revolutions in software and hardware, companies can run their communication infrastructure with the power of the Internet instead of traditional phone lines.<\/p>\n<p>This is typically accomplished through a vendor that also provides some of the hardware and programs needed to use their <a href=\"https:\/\/www.convergedsystems.com\/voip_services.html\" target=\"_blank\" rel=\"noopener\">VoIP system<\/a>. The distinction is important because these elements tie into security. While VoIP streamlines communication across the board and greatly improves performance, there are also more security risks compared with with traditional systems.<\/p>\n<p>In order to keep VoIP setups secure, there are a few things a business must deploy across the company. This is related to both workforce policies and the <a href=\"https:\/\/www.convergedsystems.com\/blog\/how-voip-technology-works\/\" target=\"_blank\" rel=\"noopener\">VoIP program<\/a> itself.<\/p>\n<p>For example, the cornerstone of <a href=\"https:\/\/www.convergedsystems.com\/managed-security.html\" target=\"_blank\" rel=\"noopener\">good security<\/a> is setting strong, complex passwords for individual logins. Depending on how many connections are allowed on the company network and whether there are remote workers, simple passwords increase the risk of a data breach.<\/p>\n<p>Backing up call data is also important, especially if you utilize <a href=\"https:\/\/www.convergedsystems.com\/cloud-101-what-is-the-cloud.html\" target=\"_blank\" rel=\"noopener\">cloud-based<\/a> VoIP systems. Backup and disaster recovery is an essential part of the modern company too, since there are a variety of threats that can compromise information. Therefore, a secondary site or method to safeguard information is recommended to better protect the data recorded on a VoIP system.<\/p>\n<p>And speaking of information, a scrupulous inspection policy is helpful for detecting fraudulent calls or strange network activity. This will prevent unauthorized third parties from using the <a href=\"https:\/\/www.convergedsystems.com\/blog\/benefits-of-voip-phone-systems\/\" target=\"_blank\" rel=\"noopener\">VoIP system<\/a>. With IP tracking, you can also make sure that the only calls made are ones with approved credentials.<\/p>\n<p>This <a href=\"https:\/\/www.convergedsystems.com\/services\/monitoring-as-a-service-maas.html\" target=\"_blank\" rel=\"noopener\">monitoring<\/a> also benefits from shut-off features, which will automatically stop unprotected or unverified call attempts from the business side. This prevents security threats.<\/p>\n<p>During hours of work, you can also double down on security by enabling network encryption. When the VoIP system is used and encryption is enabled, data will be protected by an extra layer of security. Combined with monitoring and the shut-off option, this creates a basic \u2013 but extremely safe \u2013 method of VoIP protection.<\/p>\n<p>If you\u2019re utilizing a third party VoIP provider, you may think the above may not apply. This is not true. Although many vendors do maintain security policies, taking action to protect your own information is still a critical aspect of safe <a href=\"https:\/\/www.convergedsystems.com\/blog\/10-reasons-to-use-voip\/\" target=\"_blank\" rel=\"noopener\">VoIP usage<\/a>.<\/p>\n<p>Additionally, it\u2019s worth understanding the kind of security policies your VoIP vendor employs, if applicable. You want them to take security just as seriously as you do because you rely on their infrastructure to maintain critical services. If any security policies on their side are lacking, it\u2019s a red flag, and you should explore other vendor options.<\/p>\n<p>As you can see, maintaining VoIP security isn\u2019t too hard. It comes down to network monitoring, strong passwords, and ensuring only appropriate IP addresses and\/or devices use the service. With these basics covered, your will protect your business from common threats.<\/p>\n<p>VoIP is an excellent modern alternative to traditional phone lines, provided the proper security measures are in place.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-facebook nolightbox external\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1398&#038;t=How%20to%20Keep%20Your%20VoIP%20System%20Secure&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1398&#038;p&#091;images&#093;&#091;0&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-content%2Fuploads%2F2014%2F07%2Fvoip-2-300x225.jpg&#038;p&#091;title&#093;=How%20to%20Keep%20Your%20VoIP%20System%20Secure\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-twitter nolightbox external\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1398&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-linkedin nolightbox external\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1398&#038;title=How%20to%20Keep%20Your%20VoIP%20System%20Secure\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/linkedin.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Telecom systems have evolved greatly along with technology in general. Now, thanks to revolutions in software and hardware, companies can run their communication infrastructure with the power of the Internet instead of traditional phone lines. This is typically accomplished through a vendor that also provides some of the hardware and programs needed to use their&#8230; <a class=\"moretag\" href=\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1398","post","type-post","status-publish","format-standard","hentry","category-converged-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to Keep Your VoIP System Secure<\/title>\n<meta name=\"description\" content=\"It&#039;s important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Keep Your VoIP System Secure\" \/>\n<meta property=\"og:description\" content=\"It&#039;s important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"Converged Systems Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-07-11T16:52:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-09T16:54:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"headline\":\"How to Keep Your VoIP System Secure\",\"datePublished\":\"2017-07-11T16:52:15+00:00\",\"dateModified\":\"2018-10-09T16:54:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\"},\"wordCount\":515,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg\",\"articleSection\":[\"Converged Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\",\"name\":\"How to Keep Your VoIP System Secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg\",\"datePublished\":\"2017-07-11T16:52:15+00:00\",\"dateModified\":\"2018-10-09T16:54:40+00:00\",\"author\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"description\":\"It's important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2.jpg\",\"contentUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2.jpg\",\"width\":2560,\"height\":1920,\"caption\":\"benefits of voip\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.convergedsystems.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Keep Your VoIP System Secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/\",\"name\":\"Converged Systems Blog\",\"description\":\"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Keep Your VoIP System Secure","description":"It's important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/","og_locale":"en_US","og_type":"article","og_title":"How to Keep Your VoIP System Secure","og_description":"It's important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.","og_url":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/","og_site_name":"Converged Systems Blog","article_published_time":"2017-07-11T16:52:15+00:00","article_modified_time":"2018-10-09T16:54:40+00:00","og_image":[{"url":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#article","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/"},"author":{"name":"admin","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"headline":"How to Keep Your VoIP System Secure","datePublished":"2017-07-11T16:52:15+00:00","dateModified":"2018-10-09T16:54:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/"},"wordCount":515,"commentCount":0,"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg","articleSection":["Converged Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/","url":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/","name":"How to Keep Your VoIP System Secure","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2-300x225.jpg","datePublished":"2017-07-11T16:52:15+00:00","dateModified":"2018-10-09T16:54:40+00:00","author":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"description":"It's important to take steps to keep your VoIP system secure. Here are some ways to safeguard your phone system and reduce your risk of a data breach.","breadcrumb":{"@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#primaryimage","url":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2.jpg","contentUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2014\/07\/voip-2.jpg","width":2560,"height":1920,"caption":"benefits of voip"},{"@type":"BreadcrumbList","@id":"https:\/\/www.convergedsystems.com\/blog\/keep-voip-system-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.convergedsystems.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Keep Your VoIP System Secure"}]},{"@type":"WebSite","@id":"https:\/\/www.convergedsystems.com\/blog\/#website","url":"https:\/\/www.convergedsystems.com\/blog\/","name":"Converged Systems Blog","description":"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1398","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/comments?post=1398"}],"version-history":[{"count":1,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions"}],"predecessor-version":[{"id":1399,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1398\/revisions\/1399"}],"wp:attachment":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/media?parent=1398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/categories?post=1398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/tags?post=1398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}