{"id":1280,"date":"2017-05-25T20:00:17","date_gmt":"2017-05-26T00:00:17","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/"},"modified":"2022-03-02T08:42:09","modified_gmt":"2022-03-02T13:42:09","slug":"wannacry-a-historic-cyberattack","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/","title":{"rendered":"WannaCry: A historic cyberattack"},"content":{"rendered":"<p><img decoding=\"async\" class=\"alignleft size-full wp-image-30176\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A.png\" alt=\"\" width=\"170\" height=\"170\" \/>No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats.<\/p>\n<h3>Ransomware review<\/h3>\n<p>Ransomware is a specific type of malware program that either encrypts or steals valuable data and threatens to erase it or release it publicly unless a ransom is paid. We\u2019ve been writing about this terrifying threat for years, but the true genesis of ransomware dates all the way back to 1989.<\/p>\n<p>This form of digital extortion has enjoyed peaks and troughs in popularity since then, but never has it been as dangerous as it is now. In 2015, the FBI reported a huge spike in the popularity of ransomware, and healthcare providers became common targets because of the private and time-sensitive nature of their hosted data.<\/p>\n<p>The trend got even worse, and by the end of 2016 ransomware had become a $1 billion-a-year industry.<\/p>\n<h3>The WannaCry ransomware<\/h3>\n<p>Although the vast majority of ransomware programs rely on convincing users to click compromised links in emails, the WannaCry version seems to have spread via more technical security gaps. It\u2019s still too early to be sure, but the security experts at Malwarebytes Labs believe that the <a href=\"https:\/\/blog.malwarebytes.com\/cybercrime\/2017\/05\/how-did-wannacry-ransomworm-spread\/\">reports of WannaCry being transmitted through phishing emails is simply a matter of confusion<\/a>. Thousands of other ransomware versions are spread through spam email every day and distinguishing them can be difficult.<\/p>\n<p>By combining a Windows vulnerability recently leaked from the National Security Agency\u2019s cyber arsenal and some simple programming to hunt down servers that interact with public networks, WannaCry spread itself further than any malware campaign has in the last 15 years.<\/p>\n<p>Despite infecting more than 200,000 computers in at least 150 countries, the cyberattackers have only made a fraction of what you would expect. Victims must pay the ransom in Bitcoins, a totally untraceable currency traded online. Inherent to the Bitcoin platform is a public ledger, meaning anyone can see that WannaCry\u2019s coffers have collected a measly 1% of its victims payments.<\/p>\n<h3>How to protect yourself for what comes next<\/h3>\n<p>Part of the reason this ransomware failed to scare users into paying up is because it was so poorly made. Within a day of its release, the self-propagating portion of its programming was brought to a halt by an individual unsure of why it included a 42-character URL that led to an unregistered domain. Once he registered the web address for himself, WannaCry stopped spreading.<\/p>\n<p>Unfortunately, that doesn\u2019t help the thousands that were already infected. And it definitely doesn\u2019t give you an excuse to ignore what cybersecurity experts are saying, \u201cThis is only the beginning.\u201d WannaCry was so poorly written, it\u2019s amazing it made it as far as it did. And considering it would\u2019ve made hundreds of millions of dollars if it was created by more capable programmers, your organization <em>needs to prepare for the next global cyberattack<\/em>.<\/p>\n<p>Every single day it should be your goal to complete the following:<\/p>\n<ul>\n<li>Thorough reviews of reports from basic perimeter security solutions. Antivirus software, hardware firewalls, and intrusion prevention systems log hundreds of amateur attempts on your network security every day; critical vulnerabilities can be gleaned from these documents.<\/li>\n<li>Check for updates and security patches for every single piece of software in your office, from accounting apps to operating systems. Computers with the latest updates from Microsoft were totally safe from WannaCry, which should be motivation to never again click \u201cRemind me later.\u201d<\/li>\n<li>Social engineering and phishing may not have been factors this time around, but training employees to recognize suspicious links is a surefire strategy for avoiding the thousands of other malware strains that threaten your business.<\/li>\n<\/ul>\n<p>Revisiting these strategies every single day may seem a bit much, but we\u2019ve been in the industry long enough to know that it takes only one mistake to bring your operations to a halt. For daily monitoring and support, plus industry-leading cybersecurity advice, call us today.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2017\/05\/wannacry-a-historic-cyberattack\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":1282,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[1203,52,1204,443,1205,18,444,657,1181],"class_list":["post-1280","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-2017may25security_a","tag-cybersecurity","tag-employee-training","tag-malware","tag-perimeter-security","tag-phishing","tag-ransomware","tag-software-updates","tag-wannacry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>WannaCry: A historic cyberattack<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WannaCry: A historic cyberattack\" \/>\n<meta property=\"og:description\" content=\"No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-05-26T00:00:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-02T13:42:09+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"WannaCry: A historic cyberattack\",\"datePublished\":\"2017-05-26T00:00:17+00:00\",\"dateModified\":\"2022-03-02T13:42:09+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\"},\"wordCount\":693,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg\",\"keywords\":[\"2017may25security_a\",\"cybersecurity\",\"employee training\",\"malware\",\"perimeter security\",\"phishing\",\"ransomware\",\"software updates\",\"wannacry\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\",\"name\":\"WannaCry: A historic cyberattack\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg\",\"datePublished\":\"2017-05-26T00:00:17+00:00\",\"dateModified\":\"2022-03-02T13:42:09+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WannaCry: A historic cyberattack\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WannaCry: A historic cyberattack","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"WannaCry: A historic cyberattack","og_description":"No one can escape the news of WannaCry. The IT industry has been covering this type of malware for years, but never has one campaign spread so far or infected so many computers. Read on to gain a greater understanding of what happened and how to prepare yourself for the inevitable copy cats. Ransomware review [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2017-05-26T00:00:17+00:00","article_modified_time":"2022-03-02T13:42:09+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"WannaCry: A historic cyberattack","datePublished":"2017-05-26T00:00:17+00:00","dateModified":"2022-03-02T13:42:09+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/"},"wordCount":693,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg","keywords":["2017may25security_a","cybersecurity","employee training","malware","perimeter security","phishing","ransomware","software updates","wannacry"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/","name":"WannaCry: A historic cyberattack","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg","datePublished":"2017-05-26T00:00:17+00:00","dateModified":"2022-03-02T13:42:09+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May25Security_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/wannacry-a-historic-cyberattack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"WannaCry: A historic cyberattack"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1280"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=1280"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1280\/revisions"}],"predecessor-version":[{"id":4096,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/1280\/revisions\/4096"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/1282"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=1280"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=1280"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=1280"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}