{"id":1454,"date":"2018-02-08T07:06:59","date_gmt":"2018-02-08T12:06:59","guid":{"rendered":"https:\/\/www.convergedsystems.com\/blog\/?p=1454"},"modified":"2018-10-09T11:53:59","modified_gmt":"2018-10-09T16:53:59","slug":"vendors-increasing-data-breach-risk-level","status":"publish","type":"post","link":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/","title":{"rendered":"Are Your Vendors Increasing Your Data Breach Risk Level?"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-1276\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg\" alt=\"\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg 300w, https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-768x512.jpg 768w, https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-1024x682.jpg 1024w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><\/p>\n<p>Giving third-party vendors access to your network and data can create security risks for your business. Remember the Home Depot hack? The home goods giant suffered a system breach when a hacker stole the credit information for more than 56 million customers. And the hack was made possible because of a third-party vendor.<\/p>\n<p><strong>Are Vendors a Security Risk?<\/p>\n<p><\/strong>A <a href=\"https:\/\/www.convergedsystems.com\/managed-security.html\" target=\"_blank\" rel=\"noopener\">data breach<\/a> can have major negative effects on your bottom line, as well as your reputation. When the hackers openly admit that they usually target contractors, it\u2019s a major cause for worry.<\/p>\n<p>But for many organizations, working with vendors is an inescapable part of doing business. Outsourcing work related to your payroll and IT is one of the best ways to save your business money.<\/p>\n<p>As a result, these vendors might have access to your internal network. This sort of access signals opportunity to hackers. And if any data does become compromised, those affected will likely blame you \u2013 not the vendor. After all, it was your data.<\/p>\n<p>So, your vendor could easily become a security risk. This is especially true if they don\u2019t adhere to security policies that you have put in place for <a href=\"https:\/\/www.convergedsystems.com\/blog\/6-ways-to-ensure-your-data-center-stays-secure\/\" target=\"_blank\" rel=\"noopener\">your data<\/a>. It doesn\u2019t make any sense to have complex protective measures in place within your company only to provide a potential route for cybercriminals to access your data via your vendors.<\/p>\n<p><strong>The True Cost of a Data Breach<\/strong><\/p>\n<p>If a data breach occurs, your business will have to go through a laundry list of actions to address the fallout. This might include notifying your customers and providing them with credit monitoring services. You will also have to spend time on IT fixes and sometimes even deal with fines and lawsuits.<\/p>\n<p>Depending on the size of your business, this process could cost you anywhere from tens of thousands to tens of millions of dollars. And that doesn\u2019t factor in the potential loss of business, lawsuits, and damage to your reputation.<\/p>\n<p>It\u2019s important to note that your business will need to handle these costs. Even if the breach happened through a third-party vendor, you are ultimately responsible.<\/p>\n<p><strong>So, What Can You Do?<\/strong><\/p>\n<p>It is important to spell out your expected level of <a href=\"https:\/\/www.convergedsystems.com\/blog\/5-qualities-look-data-center-provider\/\" target=\"_blank\" rel=\"noopener\">data security<\/a> to any third-party vendor that you intend to work with. Ensure that you hold your business partners to certain security policy compliance standards.<\/p>\n<p>But this process isn\u2019t simply about putting restrictions in place. It\u2019s about creating a healthy business relationship that helps both parties operate efficiently. Security is a big part of this process.<\/p>\n<p>Specify all this in your vendor agreements, in addition to outlining the responsibilities of each party in the event of a breach. It\u2019s also a good idea to have a strong vendor management process that starts long before signing the contract. You should conduct the appropriate due diligence to ensure that you pick security-conscious partners to work with your business.<\/p>\n<p><strong>Conclusion<\/strong><\/p>\n<p>Whether your business is big or small, a data breach can cause massive damage that could be impossible to recover from. Because of this, it\u2019s important to ensure that you\u2019re on the same page with your vendors when it comes to security.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-facebook nolightbox external\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1454&#038;t=Are%20Your%20Vendors%20Increasing%20Your%20Data%20Breach%20Risk%20Level%3F&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1454&#038;p&#091;images&#093;&#091;0&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-content%2Fuploads%2F2016%2F09%2FData-Security-300x200.jpg&#038;p&#091;title&#093;=Are%20Your%20Vendors%20Increasing%20Your%20Data%20Breach%20Risk%20Level%3F\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-twitter nolightbox external\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1454&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-linkedin nolightbox external\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F1454&#038;title=Are%20Your%20Vendors%20Increasing%20Your%20Data%20Breach%20Risk%20Level%3F\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/linkedin.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Giving third-party vendors access to your network and data can create security risks for your business. Remember the Home Depot hack? The home goods giant suffered a system breach when a hacker stole the credit information for more than 56 million customers. And the hack was made possible because of a third-party vendor. Are Vendors&#8230; <a class=\"moretag\" href=\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-1454","post","type-post","status-publish","format-standard","hentry","category-converged-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Are Your Vendors Increasing Your Data Breach Risk Level?<\/title>\n<meta name=\"description\" content=\"Third-party vendors might expose your company&#039;s data if you don&#039;t ensure they follow proper security policies. Here&#039;s how to keep your risk level low.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Your Vendors Increasing Your Data Breach Risk Level?\" \/>\n<meta property=\"og:description\" content=\"Third-party vendors might expose your company&#039;s data if you don&#039;t ensure they follow proper security policies. Here&#039;s how to keep your risk level low.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\" \/>\n<meta property=\"og:site_name\" content=\"Converged Systems Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-08T12:06:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-09T16:53:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"headline\":\"Are Your Vendors Increasing Your Data Breach Risk Level?\",\"datePublished\":\"2018-02-08T12:06:59+00:00\",\"dateModified\":\"2018-10-09T16:53:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\"},\"wordCount\":541,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg\",\"articleSection\":[\"Converged Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\",\"name\":\"Are Your Vendors Increasing Your Data Breach Risk Level?\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg\",\"datePublished\":\"2018-02-08T12:06:59+00:00\",\"dateModified\":\"2018-10-09T16:53:59+00:00\",\"author\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"description\":\"Third-party vendors might expose your company's data if you don't ensure they follow proper security policies. Here's how to keep your risk level low.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security.jpg\",\"contentUrl\":\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security.jpg\",\"width\":2716,\"height\":1810},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.convergedsystems.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Your Vendors Increasing Your Data Breach Risk Level?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/\",\"name\":\"Converged Systems Blog\",\"description\":\"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Are Your Vendors Increasing Your Data Breach Risk Level?","description":"Third-party vendors might expose your company's data if you don't ensure they follow proper security policies. Here's how to keep your risk level low.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/","og_locale":"en_US","og_type":"article","og_title":"Are Your Vendors Increasing Your Data Breach Risk Level?","og_description":"Third-party vendors might expose your company's data if you don't ensure they follow proper security policies. Here's how to keep your risk level low.","og_url":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/","og_site_name":"Converged Systems Blog","article_published_time":"2018-02-08T12:06:59+00:00","article_modified_time":"2018-10-09T16:53:59+00:00","og_image":[{"url":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#article","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/"},"author":{"name":"admin","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"headline":"Are Your Vendors Increasing Your Data Breach Risk Level?","datePublished":"2018-02-08T12:06:59+00:00","dateModified":"2018-10-09T16:53:59+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/"},"wordCount":541,"commentCount":0,"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg","articleSection":["Converged Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/","url":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/","name":"Are Your Vendors Increasing Your Data Breach Risk Level?","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage"},"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage"},"thumbnailUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security-300x200.jpg","datePublished":"2018-02-08T12:06:59+00:00","dateModified":"2018-10-09T16:53:59+00:00","author":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"description":"Third-party vendors might expose your company's data if you don't ensure they follow proper security policies. Here's how to keep your risk level low.","breadcrumb":{"@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#primaryimage","url":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security.jpg","contentUrl":"https:\/\/www.convergedsystems.com\/blog\/wp-content\/uploads\/2016\/09\/Data-Security.jpg","width":2716,"height":1810},{"@type":"BreadcrumbList","@id":"https:\/\/www.convergedsystems.com\/blog\/vendors-increasing-data-breach-risk-level\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.convergedsystems.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Are Your Vendors Increasing Your Data Breach Risk Level?"}]},{"@type":"WebSite","@id":"https:\/\/www.convergedsystems.com\/blog\/#website","url":"https:\/\/www.convergedsystems.com\/blog\/","name":"Converged Systems Blog","description":"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1454","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/comments?post=1454"}],"version-history":[{"count":1,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1454\/revisions"}],"predecessor-version":[{"id":1455,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/1454\/revisions\/1455"}],"wp:attachment":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/media?parent=1454"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/categories?post=1454"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/tags?post=1454"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}