{"id":1121,"date":"2018-09-25T20:00:47","date_gmt":"2018-09-26T00:00:47","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/"},"modified":"2022-03-02T08:42:07","modified_gmt":"2022-03-02T13:42:07","slug":"dont-let-hackers-fool-you-with-these-tricks","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/","title":{"rendered":"Don\u2019t let hackers fool you with these tricks"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-28230\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C.jpg\" alt=\"\" width=\"170\" height=\"170\" \/>The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren\u2019t immune to the hackers\u2019 favorite strategy \u2014 social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here\u2019s what you should know to protect your business.<\/p>\n<h3>Phishing<\/h3>\n<p>This is the most frequently used social engineering attack, especially against small businesses. Check out these frightening statistics:<\/p>\n<ul>\n<li>Kaspersky Labs revealed that its anti-phishing system <a href=\"https:\/\/securelist.com\/spam-and-phishing-in-q2-2018\/87368\/\">prevented more than 107 million attempts to connect users to malicious websites<\/a> in just one quarter of 2018.<\/li>\n<li>Barkly added that <a href=\"https:\/\/blog.barkly.com\/phishing-statistics-2016\">85% of companies have fallen prey to this nefarious scheme<\/a>.<\/li>\n<li>And PhishMe reports that the number of these scams is <a href=\"https:\/\/cofense.com\/wp-content\/uploads\/2017\/11\/Enterprise-Phishing-Resiliency-and-Defense-Report-2017.pdf&amp;sa=D&amp;ust=1537842073818000&amp;usg=AFQjCNF9En-x7TAQdVf7xaiRROzc2gUpHg\">growing by at least 65% per year<\/a>.<\/li>\n<\/ul>\n<p>How is phishing carried out? Criminals make use of emails, phone calls, or text messages to steal money. Victims are directed to phony websites or hotlines and are tricked into giving away sensitive information like names, addresses, login information, social security, and credit card numbers.<\/p>\n<p>To protect yourself, be wary of emails from people you don\u2019t know that offer you a prize, come with attachments you didn\u2019t request, direct you to suspicious sites, or urge you to act quickly. Phishing emails usually appear to come from reliable sources, but they are wolves in sheep\u2019s clothing.<\/p>\n<p>One of the most infamous and widespread examples of phishing was during the 2016 Summer Olympics in Rio, where victims received fraudulent emails for fake ticketing services that stole their personal and financial information.<\/p>\n<h3>Tailgating<\/h3>\n<p>What\u2019s the fastest and easiest way for criminals to enter a secure office? Through the front door, of course! Tailgating happens when an employee holds the door open for strangers and unauthorized visitors, allowing them to infiltrate an organization. This simple act of kindness enables fraudsters to enter restricted areas, access computers when no one is looking, or leave behind devices for snooping.<\/p>\n<h3>Quid pro quo<\/h3>\n<p>Here, scam artists offer a free service or a prize in exchange for information. They may lure their victims with a gift, concert tickets, a T-shirt, or early access to a popular game in exchange for login credentials, account details, passwords, and other important information. Or hackers may volunteer to fix their victims\u2019 IT problems to get what they want. In most cases, the gift is a cheap trinket or the tickets are fake, but damages from stolen information are all too real.<\/p>\n<h3>Pretexting<\/h3>\n<p>Fraudsters pretend to be someone else to steal information. They may pose as a telemarketer, tech support representative, co-worker, or police officer to fish out credit card information, bank account details, usernames, and passwords. The con artist may even convince the unsuspecting victim to apply for a loan over the phone to get more details from the victim. By gaining the person\u2019s trust, the scammer can fool anyone into divulging company secrets.<\/p>\n<p>In spite of the many security measures available today, fraudsters and their social engineering schemes continue to haunt and harm many businesses. Thus, it\u2019s best to prepare for the worst. To protect sensitive information, educate yourself and be careful. Remember: If anything is too good to be true, it probably is!<\/p>\n<p>To shield your business from social engineering attacks, don\u2019t take chances! Get in touch with us today.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2018\/09\/dont-let-hackers-fool-you-with-these-tricks-2\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren\u2019t immune to the hackers\u2019 favorite strategy \u2014 social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here\u2019s what you should know to protect your business. Phishing This is the most frequently [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[1012,18,1013,1014,1015,1016,1017,1018],"class_list":["post-1121","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-2018september25security_a","tag-phishing","tag-pretexting","tag-quid-pro-quo","tag-rio-olympics","tag-scams","tag-social-engineering","tag-tailgating"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Don\u2019t let hackers fool you with these tricks<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Don\u2019t let hackers fool you with these tricks\" \/>\n<meta property=\"og:description\" content=\"The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren\u2019t immune to the hackers\u2019 favorite strategy \u2014 social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here\u2019s what you should know to protect your business. Phishing This is the most frequently [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-09-26T00:00:47+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Don\u2019t let hackers fool you with these tricks\",\"datePublished\":\"2018-09-26T00:00:47+00:00\",\"dateModified\":\"2022-03-02T13:42:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\"},\"wordCount\":562,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg\",\"keywords\":[\"2018september25security_a\",\"phishing\",\"pretexting\",\"quid pro quo\",\"rio olympics\",\"scams\",\"social engineering\",\"tailgating\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\",\"name\":\"Don\u2019t let hackers fool you with these tricks\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg\",\"datePublished\":\"2018-09-26T00:00:47+00:00\",\"dateModified\":\"2022-03-02T13:42:07+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Don\u2019t let hackers fool you with these tricks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Don\u2019t let hackers fool you with these tricks","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Don\u2019t let hackers fool you with these tricks","og_description":"The volume of malicious cyber attacks is increasing every year. Although many companies use the latest network security systems, they aren\u2019t immune to the hackers\u2019 favorite strategy \u2014 social engineering. Unlike malware, social engineering tricks people into volunteering sensitive data. Here\u2019s what you should know to protect your business. Phishing This is the most frequently [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2018-09-26T00:00:47+00:00","article_modified_time":"2022-03-02T13:42:07+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Don\u2019t let hackers fool you with these tricks","datePublished":"2018-09-26T00:00:47+00:00","dateModified":"2022-03-02T13:42:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/"},"wordCount":562,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","keywords":["2018september25security_a","phishing","pretexting","quid pro quo","rio olympics","scams","social engineering","tailgating"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/","name":"Don\u2019t let hackers fool you with these tricks","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","datePublished":"2018-09-26T00:00:47+00:00","dateModified":"2022-03-02T13:42:07+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2016August18_Security_C_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/dont-let-hackers-fool-you-with-these-tricks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Don\u2019t let hackers fool you with these tricks"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1121"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1121"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1121\/revisions"}],"predecessor-version":[{"id":3795,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1121\/revisions\/3795"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1123"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1121"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1121"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1121"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}