{"id":69,"date":"2012-05-16T08:18:17","date_gmt":"2012-05-16T08:18:17","guid":{"rendered":"http:\/\/convergedsystems.com\/blog\/?p=69"},"modified":"2018-10-09T11:57:18","modified_gmt":"2018-10-09T16:57:18","slug":"ensure-security-of-your-phone","status":"publish","type":"post","link":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/","title":{"rendered":"Ensure security of your phone"},"content":{"rendered":"<p><span><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-full wp-image-10919\" src=\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\" alt=\"\" width=\"170\" height=\"170\" \/>At the office we\u2019ve become paranoid about keeping our computers secure. Many companies use security devices and passwords to ensure their data is safe. The same can\u2019t be said for smartphones. Many of us take no, or, at the very most basic, steps to ensure that our phones are safe. With the majority of employees using their device for both work and personal use, the need to keep our devices secure is paramount. <\/span><\/p>\n<p>Whether you have an Android, iPhone or Windows Phone 7, here are two tips to keep your smartphone secure:<\/p>\n<p><strong>Lock your screen <\/strong><br \/>\nIf you have data or information on your phone you would like to keep secure, the first thing you should do is lock your screen. Most smartphone users lock their phone with a 4 digit number combination, but it\u2019s recommended you use a password for higher security.<\/p>\n<ul>\n<li><strong>On Android. <\/strong>To establish a password on your device go to\u00a0<em>Settings<\/em> and select\u00a0<em>Security<\/em>. Press\u00a0<em>Screen lock<\/em>. On Ice Cream Sandwich, you have six options for security, with the least secure at the top and most secure at the bottom. Many users select\u00a0<em>Pattern<\/em> or\u00a0<em>Password<\/em>. Enter the password twice and press\u00a0<em>Confirm<\/em>.<\/li>\n<li><strong>On iPhone.<\/strong> Select the\u00a0<em>Settings <\/em>app followed by\u00a0<em>General<\/em>. From there select\u00a0<em>Passcode Lock<\/em> and turn it on. You\u2019ll be asked to set your passcode and confirm it.<\/li>\n<li><strong>On Windows Phone.<\/strong> To set a passcode go to the\u00a0<em>home screen<\/em> of your device. Open\u00a0<em>Settings<\/em> from your\u00a0<em>Application list<\/em> and select\u00a0<em>Lock Wallpaper<\/em>. Press Password, enter your password and then press Done.<\/li>\n<\/ul>\n<p>It\u2019s recommended that you set a password that\u2019s unique. Don\u2019t use your birthday, address or phone number. At the same time, you have to make it easy to remember. If you\u2019re having trouble coming up with a password, this\u00a0<a href=\"http:\/\/www.youtube.com\/watch?feature=player_embeddedv=COU5T-Wafa4#!\" class=\"external external_icon\" rel=\"nofollow\">video<\/a> by Mozilla is a big help.<\/p>\n<p><strong>Enable remote wipe <\/strong><br \/>\nWhile passwords and other security codes will go a long way in preventing others from accessing your phone, it often isn\u2019t enough. The next step in device security is to set up the ability to remotely wipe your device.<\/p>\n<ul>\n<li><strong>On Android. <\/strong>At this time there is no native remote wipe option on your phone. You\u2019ll have to download an app from the Play store. The apps work by using a push service &#8211; you \u201cpush\u201d the commands to your phone from another source i.e., a website. When you install the app, you\u2019ll have to register your phone and access it from a website.<\/li>\n<li><strong>On iPhone.<\/strong> The iPhone has remote wipe capabilities which can be accessed through iCloud. On your device select Settings, iCloud and turn on Find my iPhone. If you lose your phone log into\u00a0<a href=\"https:\/\/www.icloud.com\/\" class=\"external external_icon\" rel=\"nofollow\">iCloud<\/a> and select Find my iPhone. From there you\u2019ll be able to remotely wipe your device.<\/li>\n<li><strong>On Windows Phone.<\/strong> If you lose your phone you can remotely wipe it by going to the Windows Phone\u00a0<a href=\"http:\/\/www.windowsphone.com\/\" class=\"external external_icon\" rel=\"nofollow\">website<\/a>, logging in and selecting\u00a0<em>My Phone<\/em>. From there you\u2019ll be able to wipe your phone.<\/li>\n<\/ul>\n<p>Even if you don\u2019t have confidential information on your phone, it\u2019s a good idea to, at the very least, set a solid passcode on your phone. Adding the ability to remotely wipe your phone will ensure the information won\u2019t be viewed by other people. If you\u2019d like other ways to keep your mobile phone secure, please contact us.<\/p>\n<a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-facebook nolightbox external\" data-provider=\"facebook\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Facebook\" href=\"https:\/\/www.facebook.com\/sharer.php?u=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F69&#038;t=Ensure%20security%20of%20your%20phone&#038;s=100&#038;p&#091;url&#093;=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F69&#038;p&#091;images&#093;&#091;0&#093;=http%3A%2F%2Fconvergedsystems.com%2Fblog%2Fwp-content%2Fplugins%2FRSSPoster_PRO%2Fcache%2F6c958_MobileGeneral_May14_C.jpg&#038;p&#091;title&#093;=Ensure%20security%20of%20your%20phone\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"Facebook\" title=\"Share on Facebook\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/facebook.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-twitter nolightbox external\" data-provider=\"twitter\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Twitter\" href=\"https:\/\/twitter.com\/intent\/tweet?url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F69&#038;text=Hey%20check%20this%20out\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px;margin-right:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"twitter\" title=\"Share on Twitter\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/twitter.png\" \/><\/a><a class=\"synved-social-button synved-social-button-share synved-social-size-32 synved-social-resolution-single synved-social-provider-linkedin nolightbox external\" data-provider=\"linkedin\" target=\"_blank\" rel=\"nofollow\" title=\"Share on Linkedin\" href=\"https:\/\/www.linkedin.com\/shareArticle?mini=true&#038;url=https%3A%2F%2Fwww.convergedsystems.com%2Fblog%2Fwp-json%2Fwp%2Fv2%2Fposts%2F69&#038;title=Ensure%20security%20of%20your%20phone\" style=\"font-size: 0px;width:32px;height:32px;margin:0;margin-bottom:5px\"><img loading=\"lazy\" decoding=\"async\" alt=\"linkedin\" title=\"Share on Linkedin\" class=\"synved-share-image synved-social-image synved-social-image-share\" width=\"32\" height=\"32\" style=\"display: inline;width:32px;height:32px;margin: 0;padding: 0;border: none;box-shadow: none\" src=\"https:\/\/www.convergedsystems.com\/blog\/wp-content\/plugins\/social-media-feather\/synved-social\/image\/social\/regular\/64x64\/linkedin.png\" \/><\/a>","protected":false},"excerpt":{"rendered":"<p>At the office we\u2019ve become paranoid about keeping our computers secure. Many companies use security devices and passwords to ensure their data is safe. The same can\u2019t be said for smartphones. Many of us take no, or, at the very most basic, steps to ensure that our phones are safe. With the majority of employees&#8230; <a class=\"moretag\" href=\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-69","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Ensure security of your phone - Converged Systems Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Ensure security of your phone - Converged Systems Blog\" \/>\n<meta property=\"og:description\" content=\"At the office we\u2019ve become paranoid about keeping our computers secure. Many companies use security devices and passwords to ensure their data is safe. The same can\u2019t be said for smartphones. Many of us take no, or, at the very most basic, steps to ensure that our phones are safe. With the majority of employees... Read more\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\" \/>\n<meta property=\"og:site_name\" content=\"Converged Systems Blog\" \/>\n<meta property=\"article:published_time\" content=\"2012-05-16T08:18:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-10-09T16:57:18+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"headline\":\"Ensure security of your phone\",\"datePublished\":\"2012-05-16T08:18:17+00:00\",\"dateModified\":\"2018-10-09T16:57:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\"},\"wordCount\":573,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\",\"name\":\"Ensure security of your phone - Converged Systems Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\",\"datePublished\":\"2012-05-16T08:18:17+00:00\",\"dateModified\":\"2018-10-09T16:57:18+00:00\",\"author\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage\",\"url\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\",\"contentUrl\":\"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.convergedsystems.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Ensure security of your phone\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#website\",\"url\":\"https:\/\/www.convergedsystems.com\/blog\/\",\"name\":\"Converged Systems Blog\",\"description\":\"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"url\":\"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Ensure security of your phone - Converged Systems Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/","og_locale":"en_US","og_type":"article","og_title":"Ensure security of your phone - Converged Systems Blog","og_description":"At the office we\u2019ve become paranoid about keeping our computers secure. Many companies use security devices and passwords to ensure their data is safe. The same can\u2019t be said for smartphones. Many of us take no, or, at the very most basic, steps to ensure that our phones are safe. With the majority of employees... Read more","og_url":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/","og_site_name":"Converged Systems Blog","article_published_time":"2012-05-16T08:18:17+00:00","article_modified_time":"2018-10-09T16:57:18+00:00","og_image":[{"url":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg","type":"","width":"","height":""}],"author":"admin","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#article","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/"},"author":{"name":"admin","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"headline":"Ensure security of your phone","datePublished":"2012-05-16T08:18:17+00:00","dateModified":"2018-10-09T16:57:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/"},"wordCount":573,"commentCount":0,"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/","url":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/","name":"Ensure security of your phone - Converged Systems Blog","isPartOf":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage"},"image":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage"},"thumbnailUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg","datePublished":"2012-05-16T08:18:17+00:00","dateModified":"2018-10-09T16:57:18+00:00","author":{"@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49"},"breadcrumb":{"@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#primaryimage","url":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg","contentUrl":"http:\/\/convergedsystems.com\/blog\/wp-content\/plugins\/RSSPoster_PRO\/cache\/6c958_MobileGeneral_May14_C.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.convergedsystems.com\/blog\/ensure-security-of-your-phone\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.convergedsystems.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Ensure security of your phone"}]},{"@type":"WebSite","@id":"https:\/\/www.convergedsystems.com\/blog\/#website","url":"https:\/\/www.convergedsystems.com\/blog\/","name":"Converged Systems Blog","description":"Converged Communication Systems (CCS) provides best-in-class IP Telephony \/ Unified Communications solutions.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.convergedsystems.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.convergedsystems.com\/blog\/#\/schema\/person\/0ef3bbc784661644315f0d1ccedc2d49","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/973de09019523f7fecbb85949d10db6082cc841dc1612acccf7d55141750325c?s=96&d=mm&r=g","caption":"admin"},"url":"https:\/\/www.convergedsystems.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/69","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/comments?post=69"}],"version-history":[{"count":3,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/69\/revisions"}],"predecessor-version":[{"id":139,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/posts\/69\/revisions\/139"}],"wp:attachment":[{"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/media?parent=69"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/categories?post=69"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.convergedsystems.com\/blog\/wp-json\/wp\/v2\/tags?post=69"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}