{"id":29,"date":"2012-04-20T17:31:09","date_gmt":"2012-04-20T17:31:09","guid":{"rendered":"http:\/\/convergedsystems.com\/blog\/?p=29"},"modified":"2018-10-09T11:57:51","modified_gmt":"2018-10-09T16:57:51","slug":"p2p-and-cloud-storage-can-have-risk","status":"publish","type":"post","link":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/","title":{"rendered":"P2P and Cloud Storage Can Have Risk"},"content":{"rendered":"<p><span><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-10304\" src=\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\" alt=\"\" width=\"170\" height=\"170\" \/>Does your company use cloud storage services or peer-to-peer (P2P) networks for the storage and sharing of data? Many businesses are now using both these services in an effort to make work less complicated. But did you know that there are potential issues in relation to recoverability and security of data? <\/span><\/p>\n<p>With the seizure of a number of cloud storage and sharing websites, including Megaupload, and the seemingly omnipresent malware in P2P files and the shaky security in relation to P2P <a title=\"Data Network Services\" href=\"http:\/\/convergedsystems.com\/data_networks.html\" target=\"_blank\">networks<\/a>, businesses have had their hands full staying secure. Do you know what your options are when it comes to <a title=\"Ensure security of your phone\" href=\"http:\/\/convergedsystems.com\/blog\/ensure-security-of-your-phone\/\" target=\"_blank\">data security<\/a>?<\/p>\n<p><strong>Cloud Services\u00a0Know how\u00a0<\/strong><br \/>\nThe recent seizure of Megaupload\u2019s files and servers by the US Government caught many people and businesses unprepared. While Megaupload\u2019s main purpose was file sharing, it was found that a large number of organizations were using their services to store files. If you had files stored on Megaupload, the chances of getting the files back are non-existent.<\/p>\n<p>It needs to be pointed out that many cloud services don\u2019t guarantee that files stored on the service will be recoverable in the event of a crash, or disruption in service, e.g., a government seizing servers. If you read the user agreements of a number of major cloud services, they all have clauses stating that if data stored on their service is lost for any reason, it\u2019s gone forever, and the hosts can\u2019t be held liable for losses.<\/p>\n<p><strong>Risks of P2P<\/strong><br \/>\nWith high speed Internet widely available at low prices, P2P file sharing has become incredibly popular, it\u2019s almost uncommon to find someone who has never used a P2P service. If you or your employees use P2P at your office, there are a number of potential security threats you should be aware of:<\/p>\n<ul>\n<li><strong>The unknown share: <\/strong>If you put a file in a folder that is shared on a P2P network, it\u2019ll be shared with all other people connected to that folder and almost anyone can access it. This is normally done by mistake, i.e., not looking where the file will be saved when you save it. There\u2019s also malware out there that will move files into a shared folder which the developer of the malware can find and upload with ease and without the user knowing it is happening.<\/li>\n<li>Open network:\u00a0Typically P2P works on open networks: users give and share. What this means is that when using P2P on a poorly configured network, the whole network could be unsecure, allowing for access to other computers connected to the network.<\/li>\n<li>Untracked data:\u00a0If you share a document with another person, and they then share it with others, there is potentially, an unlimited amount of people that can get the data. If you want to take it back, it can be impossible to do so, even if the original document is deleted.<\/li>\n<li>Storage hijacking:\u00a0There\u2019s news of malware that has been developed with the purpose of downloading illegal material onto your hard drive. This could pose a problem if the data is found, as you will be liable.<\/li>\n<\/ul>\n<p><strong>What Should I do? <\/strong><br \/>\nWith regards to cloud services, as with anything that comes with a contract, the first thing you should do is gain an understanding of it by utilizing reading material such as blogs, news articles and Wikis. It\u2019s a pain in the neck, but it\u2019ll help you understand the boundaries of the program and your responsibilities. Remember that if you go to court to get files back from a company, and it becomes known that you didn\u2019t read the agreement, you\u2019ll probably end up losing that case.<\/p>\n<p>Second, it\u2019s not recommended to keep single copies of data on one cloud service. Chances are high that in your business, you store your data and backups in a place separate from the computer. This makes sense with the cloud as well &#8211; keep your data with a number of different cloud services. If it\u2019s important enough, have physical backups of what you put in the cloud.<\/p>\n<p>For P2P networks there are also a number of steps you can take to protect the data on your network:<\/p>\n<ul>\n<li>The most obvious one is to ban employees from using any file sharing services outside of your network.<\/li>\n<li>If you do allow file sharing, it\u2019s a good idea to establish and strictly enforce a protocol for this. You should also set which users are allowed to share files, and what files are appropriate to share. Be sure that all staff are aware of your policy and the measures that will be taken in the event of any deviations.<\/li>\n<li>Develop a system to classify documents by whether or not they can be shared, and who they can be shared with.<\/li>\n<li>If you work in an office where you need to share files, but don\u2019t want to use a P2P network or the cloud, and are unsure of other solutions out there, don\u2019t worry. There are companies that specialize in document sharing solutions that should be able to provide you with assistance.<\/li>\n<\/ul>\n<p>The most important thing is that whatever the situation is, you take action to try to solve the problem while frequently revisiting the actions to ensure that they are working. If you\u2019d like to learn more about document sharing over the cloud, or via P2P networks, give us a buzz. We\u2019re more than happy to help.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-facebook nolightbox external\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F29&#038;t=P2P%20and%20Cloud%20Storage%20Can%20Have%20Risk&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F29&#038;p&#091;images&#093;&#091;0&#093;=http%3A%2F%2Fconvergedsystems.com%2Fblog%2Fwp-content%2Fplugins%2FRSSPoster_PRO%2Fcache%2F15a06_Security_Apr11_C.jpg&#038;p&#091;title&#093;=P2P%20and%20Cloud%20Storage%20Can%20Have%20Risk\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-twitter nolightbox external\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F29&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-linkedin nolightbox external\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F29&#038;title=P2P%20and%20Cloud%20Storage%20Can%20Have%20Risk\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/linkedin.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>Does your company use cloud storage services or peer-to-peer (P2P) networks for the storage and sharing of data? Many businesses are now using both these services in an effort to make work less complicated. But did you know that there are potential issues in relation to recoverability and security of data? With the seizure of&#8230; <a class=\"moretag\" href=\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-29","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>P2P and Cloud Storage Can Have Risk - Converged Systems Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"P2P and Cloud Storage Can Have Risk - Converged Systems Blog\" \/>\n<meta property=\"og:description\" content=\"Does your company use cloud storage services or peer-to-peer (P2P) networks for the storage and sharing of data? Many businesses are now using both these services in an effort to make work less complicated. But did you know that there are potential issues in relation to recoverability and security of data? With the seizure of... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\" \/>\n<meta property=\"og:site_name\" content=\"Converged Systems Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-20T17:31:09+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-09T16:57:51+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"headline\":\"P2P and Cloud Storage Can Have Risk\",\"datePublished\":\"2012-04-20T17:31:09+00:00\",\"dateModified\":\"2018-10-09T16:57:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\"},\"wordCount\":938,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\",\"name\":\"P2P and Cloud Storage Can Have Risk - Converged Systems Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\",\"datePublished\":\"2012-04-20T17:31:09+00:00\",\"dateModified\":\"2018-10-09T16:57:51+00:00\",\"author\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage\",\"url\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\",\"contentUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.convergedsystems.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"P2P and Cloud Storage Can Have Risk\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/\",\"name\":\"Converged Systems Blog\",\"description\":\"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"P2P and Cloud Storage Can Have Risk - Converged Systems Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/","og_locale":"en_US","og_type":"article","og_title":"P2P and Cloud Storage Can Have Risk - Converged Systems Blog","og_description":"Does your company use cloud storage services or peer-to-peer (P2P) networks for the storage and sharing of data? Many businesses are now using both these services in an effort to make work less complicated. But did you know that there are potential issues in relation to recoverability and security of data? With the seizure of... Read more","og_url":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/","og_site_name":"Converged Systems Blog","article_published_time":"2012-04-20T17:31:09+00:00","article_modified_time":"2018-10-09T16:57:51+00:00","og_image":[{"url":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#article","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/"},"author":{"name":"admin","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"headline":"P2P and Cloud Storage Can Have Risk","datePublished":"2012-04-20T17:31:09+00:00","dateModified":"2018-10-09T16:57:51+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/"},"wordCount":938,"commentCount":0,"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/","url":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/","name":"P2P and Cloud Storage Can Have Risk - Converged Systems Blog","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage"},"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg","datePublished":"2012-04-20T17:31:09+00:00","dateModified":"2018-10-09T16:57:51+00:00","author":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"breadcrumb":{"@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#primaryimage","url":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg","contentUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/15a06_Security_Apr11_C.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.convergedsystems.com\/blog\/p2p-and-cloud-storage-can-have-risk\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.convergedsystems.com\/blog\/"},{"@type":"ListItem","position":2,"name":"P2P and Cloud Storage Can Have Risk"}]},{"@type":"WebSite","@id":"https:\/\/www.convergedsystems.com\/blog\/#website","url":"https:\/\/www.convergedsystems.com\/blog\/","name":"Converged Systems Blog","description":"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/29","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/comments?post=29"}],"version-history":[{"count":5,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/29\/revisions"}],"predecessor-version":[{"id":1483,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/29\/revisions\/1483"}],"wp:attachment":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/media?parent=29"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/categories?post=29"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/tags?post=29"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}