{"id":663,"date":"2021-06-30T20:00:15","date_gmt":"2021-07-01T00:00:15","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/"},"modified":"2023-04-26T23:41:19","modified_gmt":"2023-04-27T03:41:19","slug":"7-ways-to-boost-data-protection-in-microsoft-365","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/","title":{"rendered":"7 Ways to boost data protection in Microsoft 365"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-30198 alignleft\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B.png\" alt=\"\" width=\"170\" height=\"170\" \/>More than just offering apps and cloud services designed to boost productivity, Microsoft 365 also provides robust security tools for protecting data from loss and theft. Make the most out of these tools and ensure data security by following these tips.<\/p>\n<h3>Take advantage of policy alerts<\/h3>\n<p>Establish policy notifications in Microsoft 365\u2019s Compliance Center to help you meet your company\u2019s data security obligations. With these in place, your employees will receive policy tips about sending confidential information anytime they\u2019re about to send messages to contacts outside of the company network. These preemptive warnings can prevent data leaks and also educate users on safer data sharing practices.<\/p>\n<h3>Secure mobile devices<\/h3>\n<p>Since employees often use personal smartphones or computers to access their work email, calendar, contacts, and documents \u2014 especially if they\u2019re working remotely \u2014 securing employee-owned devices should be a critical part of protecting your organization\u2019s data. Installing mobile device management features for Microsoft 365 enables you to manage security policies and access permissions\/restrictions, and remotely wipe sensitive data from mobile devices if they\u2019re lost or stolen.<\/p>\n<h3>Use multifactor authentication<\/h3>\n<p>Relying on a single password to protect your Microsoft 365 accounts could lead to account hijacking, which could put your data at risk of being compromised. Instead, enable multifactor authentication (MFA). MFA requires users to supply additional credentials on top of a password before they can access their accounts. This makes it difficult for hackers to access your accounts since they not only have to guess user passwords, but they also need to provide a second authentication factor like a one-time SMS code or a fingerprint scan.<\/p>\n<h3>Apply session timeouts<\/h3>\n<p>Many employees usually forget to log out of their Microsoft 365 accounts and keep their computers or mobile devices unlocked. This could give unauthorized users unfettered access to company accounts, allowing them to steal sensitive data. By applying session timeouts to Microsoft 365 accounts, email accounts, and internal networks, users will be automatically logged out after a period of inactivity, preventing hackers from taking over users\u2019 devices and accessing private information.<\/p>\n<h3>Avoid public calendar sharing<\/h3>\n<p>Microsoft 365\u2019s calendar sharing feature allows employees to share and sync their schedules with their colleagues. However, publicly sharing this information is a bad idea because it helps attackers understand how your company works, determine who\u2019s away, and identify vulnerable users. For instance, if security administrators are publicly listed as \u201cAway on vacation,\u201d an attacker may see this as an opportunity to unleash malware on unattended computers.<\/p>\n<h3>Employ role-based access controls<\/h3>\n<p>Access management is another Microsoft 365 feature that will limit the flow of sensitive data across your organization. It lets you determine which users have access to specific files in your company. For example, rank-and-file employees won\u2019t be able to read or edit executive-level documents, minimizing the risk of data leaks.<\/p>\n<h3>Encrypt emails<\/h3>\n<p>Encrypting classified information is your last line of defense against data breaches. If hackers intercept your emails, encryption tools will make files unreadable to unauthorized recipients. This is a must-have for Microsoft 365, where files and emails are shared on a regular basis.<\/p>\n<p>Partner with us to ensure your organization\u2019s Microsoft 365 accounts are always secure and compliant with changing data security requirements. Give us a call today \u2014 our team of experts are here to help.<\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2021\/06\/7-ways-to-boost-data-protection-in-microsoft-365\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>More than just offering apps and cloud services designed to boost productivity, Microsoft 365 also provides robust security tools for protecting data from loss and theft. Make the most out of these tools and ensure data security by following these tips. Take advantage of policy alerts Establish policy notifications in Microsoft 365\u2019s Compliance Center to [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":665,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[69],"tags":[308,309,310,221,311,267,72,312,105,313,314],"class_list":["post-663","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office","tag-2021june30office_a","tag-access-management","tag-calendar-sharing","tag-compliance","tag-data-security","tag-encryption","tag-microsoft-365","tag-mobile-device-management","tag-multifactor-authentication","tag-policy-alerts","tag-session-timeouts"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Ways to boost data protection in Microsoft 365<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Ways to boost data protection in Microsoft 365\" \/>\n<meta property=\"og:description\" content=\"More than just offering apps and cloud services designed to boost productivity, Microsoft 365 also provides robust security tools for protecting data from loss and theft. Make the most out of these tools and ensure data security by following these tips. Take advantage of policy alerts Establish policy notifications in Microsoft 365\u2019s Compliance Center to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-07-01T00:00:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-27T03:41:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"7 Ways to boost data protection in Microsoft 365\",\"datePublished\":\"2021-07-01T00:00:15+00:00\",\"dateModified\":\"2023-04-27T03:41:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\"},\"wordCount\":557,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg\",\"keywords\":[\"2021june30office_a\",\"access management\",\"calendar sharing\",\"compliance\",\"data security\",\"encryption\",\"microsoft 365\",\"mobile device management\",\"multifactor authentication\",\"policy alerts\",\"session timeouts\"],\"articleSection\":[\"Office\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\",\"name\":\"7 Ways to boost data protection in Microsoft 365\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg\",\"datePublished\":\"2021-07-01T00:00:15+00:00\",\"dateModified\":\"2023-04-27T03:41:19+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Ways to boost data protection in Microsoft 365\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Ways to boost data protection in Microsoft 365","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"7 Ways to boost data protection in Microsoft 365","og_description":"More than just offering apps and cloud services designed to boost productivity, Microsoft 365 also provides robust security tools for protecting data from loss and theft. Make the most out of these tools and ensure data security by following these tips. Take advantage of policy alerts Establish policy notifications in Microsoft 365\u2019s Compliance Center to [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2021-07-01T00:00:15+00:00","article_modified_time":"2023-04-27T03:41:19+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"7 Ways to boost data protection in Microsoft 365","datePublished":"2021-07-01T00:00:15+00:00","dateModified":"2023-04-27T03:41:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/"},"wordCount":557,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg","keywords":["2021june30office_a","access management","calendar sharing","compliance","data security","encryption","microsoft 365","mobile device management","multifactor authentication","policy alerts","session timeouts"],"articleSection":["Office"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/","name":"7 Ways to boost data protection in Microsoft 365","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg","datePublished":"2021-07-01T00:00:15+00:00","dateModified":"2023-04-27T03:41:19+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2017May29Office_B_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/7-ways-to-boost-data-protection-in-microsoft-365\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"7 Ways to boost data protection in Microsoft 365"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/663"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=663"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/663\/revisions"}],"predecessor-version":[{"id":3729,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/663\/revisions\/3729"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/665"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=663"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=663"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=663"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}