{"id":1018,"date":"2019-08-27T20:00:33","date_gmt":"2019-08-28T00:00:33","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/"},"modified":"2022-03-02T08:41:50","modified_gmt":"2022-03-02T13:41:50","slug":"how-to-keep-your-data-safe-and-secure","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/","title":{"rendered":"How to keep your data safe and secure"},"content":{"rendered":"<p><span style=\"font-weight: 400;\"><img decoding=\"async\" class=\"alignleft size-full wp-image-31853\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C.png\" alt=\"\" width=\"170\" height=\"170\" \/>Data security and privacy should be every small business owner\u2019s top priority in this day when cybercriminals are on the loose. The good news is you don\u2019t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.\u00a0<\/span><\/p>\n<h3>Cover your webcam<\/h3>\n<p><span style=\"font-weight: 400;\">If Facebook founder Mark Zuckerberg, former FBI Director James Comey, and National Security Agency whistleblower Edward Snowden all believe their webcams could be compromised, there\u2019s no reason you should feel safe. They\u2019re not overreacting because of some ruthless paparazzi that\u2019s hounding them. It\u2019s a fact that cybercriminals can use your webcam to spy on you.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Though it might sound like a scene from an action movie or crime thriller, this has actually happened on several occasions. Hackers do this either to satisfy their voyeuristic tendencies or, more commonly, to steal personal information. This is a very real threat with disturbing repercussions.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With your webcam, cybercriminals can examine your surroundings, determine your location, as well as spy on the people you\u2019re with. They can use this information to hold you ransom and threaten to broadcast your most intimate and vulnerable moments if you don\u2019t pay up.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fortunately, guarding yourself against this danger is easy. Covering your webcam should do the trick. You can use regular tape or you can purchase a cheap webcam cover online.\u00a0<\/span><\/p>\n<h3>Use a privacy shield<\/h3>\n<p><span style=\"font-weight: 400;\">Think of privacy guards as those iPhone screen protectors but with an anti-snooping feature. These are thin covers you put on your computer, laptop, or smartphone screen to limit viewing angles. Once installed, anyone trying to look at your screen from anywhere \u2014 except straight-on \u2014 sees nothing.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Privacy filters are commonly used to protect work devices that display or contain critical files with sensitive data or confidential information. However, less sensitive, personal devices are still vulnerable to \u201cshoulder surfing\u201d \u2014 the act of peeking at someone else\u2019s screen, with or without ill intent. This is the reason we recommend using these protectors on all devices.\u00a0<\/span><\/p>\n<h3>Get a physical authentication key<\/h3>\n<p><span style=\"font-weight: 400;\">Requiring more than one set of credentials to access sensitive resources has become the standard practice for established online services. With two-factor authentication in place, you can gain access to your account only after you\u2019ve entered an authentication code. This is something that the website sends to your smartphone once you\u2019ve entered your account credentials.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Until recently, two-factor authentication relied mostly on text messages sent to mobile phones. But professionals now realize that phones can be hijacked to redirect text messages. Moreover, authentication codes can be stolen, or users can be tricked into entering these codes via a convincing phishing website.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you\u2019re looking for authentication services that can\u2019t be hijacked, stolen, or lost, your best bet is a USB or Bluetooth key that you can carry always. This means nobody \u2014 not even you \u2014 will be able to access your account without the physical key. Talk about ultimate security at your fingertips.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you need help setting up two-factor authentication or IT security services, contact our experts and have peace of mind. <\/span><\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2019\/08\/how-to-keep-your-data-safe-and-secure\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security and privacy should be every small business owner\u2019s top priority in this day when cybercriminals are on the loose. The good news is you don\u2019t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.\u00a0 Cover your webcam If Facebook founder Mark Zuckerberg, [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1020,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[49],"tags":[877,347,52,348,349,350,351],"class_list":["post-1018","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-hardware","tag-2019august27hardware_a","tag-authentication","tag-cybersecurity","tag-data-protection","tag-easy-security","tag-two-factor","tag-webcam"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to keep your data safe and secure<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to keep your data safe and secure\" \/>\n<meta property=\"og:description\" content=\"Data security and privacy should be every small business owner\u2019s top priority in this day when cybercriminals are on the loose. The good news is you don\u2019t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.\u00a0 Cover your webcam If Facebook founder Mark Zuckerberg, [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-08-28T00:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:41:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"How to keep your data safe and secure\",\"datePublished\":\"2019-08-28T00:00:33+00:00\",\"dateModified\":\"2022-03-02T13:41:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\"},\"wordCount\":536,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg\",\"keywords\":[\"2019august27hardware_a\",\"authentication\",\"cybersecurity\",\"data protection\",\"easy security\",\"two-factor\",\"webcam\"],\"articleSection\":[\"Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\",\"name\":\"How to keep your data safe and secure\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg\",\"datePublished\":\"2019-08-28T00:00:33+00:00\",\"dateModified\":\"2022-03-02T13:41:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to keep your data safe and secure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to keep your data safe and secure","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"How to keep your data safe and secure","og_description":"Data security and privacy should be every small business owner\u2019s top priority in this day when cybercriminals are on the loose. The good news is you don\u2019t have to be a tech genius to make it happen. Here are practical ways to shield your company from cyberattacks.\u00a0 Cover your webcam If Facebook founder Mark Zuckerberg, [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2019-08-28T00:00:33+00:00","article_modified_time":"2022-03-02T13:41:50+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"How to keep your data safe and secure","datePublished":"2019-08-28T00:00:33+00:00","dateModified":"2022-03-02T13:41:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/"},"wordCount":536,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg","keywords":["2019august27hardware_a","authentication","cybersecurity","data protection","easy security","two-factor","webcam"],"articleSection":["Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/","name":"How to keep your data safe and secure","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg","datePublished":"2019-08-28T00:00:33+00:00","dateModified":"2022-03-02T13:41:50+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2018January22Hardware_C_PH-1.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/how-to-keep-your-data-safe-and-secure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"How to keep your data safe and secure"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1018"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1018"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1018\/revisions"}],"predecessor-version":[{"id":3867,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1018\/revisions\/3867"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1020"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1018"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1018"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1018"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}