{"id":748,"date":"2021-04-23T20:00:01","date_gmt":"2021-04-24T00:00:01","guid":{"rendered":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/"},"modified":"2023-04-26T23:41:22","modified_gmt":"2023-04-27T03:41:22","slug":"protect-your-facebook-and-twitter-from-hackers","status":"publish","type":"post","link":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/","title":{"rendered":"Protect your Facebook and Twitter from hackers"},"content":{"rendered":"<p><img decoding=\"async\" class=\"size-full wp-image-36535 alignleft\" src=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A.png\" alt=\"\" width=\"170\" height=\"170\" \/>Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media.<\/p>\n<h3>Lock screens exist for a reason<\/h3>\n<p>Always lock all your devices as soon as you stop using them. This way, you are safe from the simplest hack of all: someone opening a social media site on your browser while you\u2019re still signed in.<\/p>\n<p>In case you didn\u2019t know, here\u2019s how to lock your computer:<\/p>\n<p><b>On Macs:<\/b><\/p>\n<ul>\n<li>Press <i>Ctrl+Command+Q<\/i>.<\/li>\n<li>Click the Apple logo on the top left corner of the screen, and click <i>Lock screen<\/i>.<\/li>\n<\/ul>\n<p><b>On Windows devices:<\/b><\/p>\n<ul>\n<li>Press <i>Windows key+L<\/i>.<\/li>\n<li>If there are multiple users using the device, click the Start button on the bottom left corner of the screen, then select <i>User &gt; Lock<\/i>.<\/li>\n<\/ul>\n<h3>Strong passwords aren&#8217;t out of fashion \u2014 yet<\/h3>\n<p>A six-digit passcode may be enough to secure your phone, but you\u2019ll need something much more complicated for your social media account passwords. Create a password that you don\u2019t use for any other account because with the regular occurrence of data breaches, hackers probably already have a long list of your favorite passwords from other websites and platforms.<\/p>\n<p>It is best to use a password manager like <a href=\"https:\/\/1password.com\/\">1Password<\/a>, <a href=\"https:\/\/www.lastpass.com\/\">LastPass<\/a>, or <a href=\"https:\/\/www.dashlane.com\/\">Dashlane<\/a>. These allow you to generate, save, and retrieve complex passwords.<\/p>\n<p>You can also enable multifactor authentication, which requires users to fulfill at least one more identity verification step after entering their username and password. The extra step or steps can be getting your fingerprint scanned or entering a one-time passcode on an authentication app. Even if hackers have your password, they won\u2019t be able to log in without the additional authentication requirements.<\/p>\n<h3>Make use of social media features<\/h3>\n<p>Facebook can help you monitor who\u2019s accessing your account and from where. On a Mac or Windows computer, click on the down arrow located at the upper right corner of your Newsfeed and select <i>Settings and Privacy<\/i>. Then click <i>Settings &gt; Security and Login<\/i> to get more information.<\/p>\n<p>Under the section <b>Where You&#8217;re Logged In<\/b>, you\u2019ll see a list of the places and devices you\u2019re logged into. If you don\u2019t recognize a particular location or device, that means someone else has logged in as you and is likely doing things you do not approve of. You need to log them out forcibly (by clicking the ellipsis on the row indicating the malicious login and click <i>Not you?<\/i>) and then report the incident immediately.<\/p>\n<p>Then, under <b>Setting Up Extra Security<\/b>, turn on <i>Get alerts about unrecognized logins<\/i>. Unfortunately, as of this writing, Twitter doesn\u2019t have the same option. This makes implementing multifactor authentication even more necessary.<\/p>\n<p>Hackers can also take over your Facebook and Twitter accounts through third-party services to which you\u2019ve given access to your profiles, so make sure to double-check what you have approved. Here\u2019s what you need to do:<\/p>\n<ul>\n<li><strong>Facebook<\/strong>: Go to <i>Settings &gt; Apps and Websites<\/i> to view and manage third-party services that use Facebook to log you into the accounts you have with them.<\/li>\n<li><strong>Twitter<\/strong>: Go to <i>Settings and Privacy &gt; Apps<\/i> to check and edit the list.<\/li>\n<\/ul>\n<p>Lastly, check the permissions Facebook and Twitter have on your smartphone or tablet.<\/p>\n<ul>\n<li><strong>Android<\/strong>: Go to <i>Settings &gt; Apps &gt; App permissions<\/i>.<\/li>\n<li><strong>iOS<\/strong>: Go to <i>Settings &gt; Privacy<\/i> to manage which service can access which parts of your phone (such as the camera and speaker).<\/li>\n<\/ul>\n<h3>Less personal info, fewer problems<\/h3>\n<p>These steps are just the beginning of what you should be doing. You should also limit the personal data you share on your social media accounts. Avoid oversharing.<\/p>\n<p>By following these tips, you can significantly prevent Facebook and Twitter hacking.<\/p>\n<p><i>Cybersecurity is a sprawling issue \u2014 and social media privacy is but one of the many things you need to stay on top of. For 24\/7 support, call our team of experts today.<\/i><\/p>\n<div class=\"autoblogfoot\">Published with permission from TechAdvisory.org. <a href=\"https:\/\/www.techadvisory.org\/2021\/04\/protect-your-facebook-and-twitter-from-hackers-2\/\">Source.<\/a><\/div><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock [&hellip;]<\/p>\n","protected":false},"author":53,"featured_media":750,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[13],"tags":[474,29,475,222,55,476,105,179,19,477,478],"class_list":["post-748","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-2021april23security_a","tag-android","tag-apps","tag-facebook","tag-ios","tag-login","tag-multifactor-authentication","tag-privacy","tag-security","tag-settings","tag-twitter"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.8 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect your Facebook and Twitter from hackers<\/title>\n<meta name=\"robots\" content=\"noindex, follow\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect your Facebook and Twitter from hackers\" \/>\n<meta property=\"og:description\" content=\"Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"TechSolutions, Inc.\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-24T00:00:01+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-27T03:41:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TechSolutions\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:site\" content=\"@TechSolutionsDE\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TechSolutions\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\"},\"author\":{\"name\":\"TechSolutions\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\"},\"headline\":\"Protect your Facebook and Twitter from hackers\",\"datePublished\":\"2021-04-24T00:00:01+00:00\",\"dateModified\":\"2023-04-27T03:41:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\"},\"wordCount\":700,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg\",\"keywords\":[\"2021april23security_a\",\"android\",\"apps\",\"facebook\",\"ios\",\"login\",\"multifactor authentication\",\"privacy\",\"security\",\"settings\",\"twitter\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\",\"name\":\"Protect your Facebook and Twitter from hackers\",\"isPartOf\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg\",\"datePublished\":\"2021-04-24T00:00:01+00:00\",\"dateModified\":\"2023-04-27T03:41:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg\",\"width\":900,\"height\":300},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.techsolutionsinc.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Protect your Facebook and Twitter from hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#website\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"name\":\"TechSolutions, Inc.\",\"description\":\"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.\",\"publisher\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#organization\",\"name\":\"TechSolutions, Inc.\",\"url\":\"https:\/\/www.techsolutionsinc.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"contentUrl\":\"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png\",\"width\":338,\"height\":170,\"caption\":\"TechSolutions, Inc.\"},\"image\":{\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/TechSolutionsIncDE\/\",\"https:\/\/x.com\/TechSolutionsDE\",\"https:\/\/www.linkedin.com\/company\/techsolutions-inc\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f\",\"name\":\"TechSolutions\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g\",\"caption\":\"TechSolutions\"},\"url\":\"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect your Facebook and Twitter from hackers","robots":{"index":"noindex","follow":"follow"},"og_locale":"en_US","og_type":"article","og_title":"Protect your Facebook and Twitter from hackers","og_description":"Popular social media platforms like Facebook and Twitter have been suffering massive data breaches for a number of years now. If you wish to continue using these services, you need to tighten your social media privacy settings. Here are a few reminders and tips to help you secure your personal information on social media. Lock [&hellip;]","og_url":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/","og_site_name":"TechSolutions, Inc.","article_publisher":"https:\/\/www.facebook.com\/TechSolutionsIncDE\/","article_published_time":"2021-04-24T00:00:01+00:00","article_modified_time":"2023-04-27T03:41:22+00:00","og_image":[{"width":900,"height":300,"url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg","type":"image\/jpeg"}],"author":"TechSolutions","twitter_card":"summary_large_image","twitter_creator":"@TechSolutionsDE","twitter_site":"@TechSolutionsDE","twitter_misc":{"Written by":"TechSolutions","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#article","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/"},"author":{"name":"TechSolutions","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f"},"headline":"Protect your Facebook and Twitter from hackers","datePublished":"2021-04-24T00:00:01+00:00","dateModified":"2023-04-27T03:41:22+00:00","mainEntityOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/"},"wordCount":700,"commentCount":0,"publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg","keywords":["2021april23security_a","android","apps","facebook","ios","login","multifactor authentication","privacy","security","settings","twitter"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/","url":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/","name":"Protect your Facebook and Twitter from hackers","isPartOf":{"@id":"https:\/\/www.techsolutionsinc.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg","datePublished":"2021-04-24T00:00:01+00:00","dateModified":"2023-04-27T03:41:22+00:00","breadcrumb":{"@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#primaryimage","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2021\/11\/2021April23Security_A_PH.jpg","width":900,"height":300},{"@type":"BreadcrumbList","@id":"https:\/\/www.techsolutionsinc.com\/blog\/protect-your-facebook-and-twitter-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.techsolutionsinc.com\/"},{"@type":"ListItem","position":2,"name":"Protect your Facebook and Twitter from hackers"}]},{"@type":"WebSite","@id":"https:\/\/www.techsolutionsinc.com\/#website","url":"https:\/\/www.techsolutionsinc.com\/","name":"TechSolutions, Inc.","description":"Optimized IT solutions supercharge your productivity and growth, and our IT services make it easy to take full advantage. Contact us for a FREE consultation.","publisher":{"@id":"https:\/\/www.techsolutionsinc.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.techsolutionsinc.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.techsolutionsinc.com\/#organization","name":"TechSolutions, Inc.","url":"https:\/\/www.techsolutionsinc.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","contentUrl":"https:\/\/www.techsolutionsinc.com\/wp-content\/uploads\/2020\/05\/logo-tech-solutions-r1.png","width":338,"height":170,"caption":"TechSolutions, Inc."},"image":{"@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/TechSolutionsIncDE\/","https:\/\/x.com\/TechSolutionsDE","https:\/\/www.linkedin.com\/company\/techsolutions-inc"]},{"@type":"Person","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/e9de8967ba8dfdec219bdd0122a4326f","name":"TechSolutions","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.techsolutionsinc.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/cf65cbb3684cefcd144f9e91edea7aa4?s=96&d=mm&r=g","caption":"TechSolutions"},"url":"https:\/\/www.techsolutionsinc.com\/blog\/author\/techsolutions\/"}]}},"_links":{"self":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/748"}],"collection":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/users\/53"}],"replies":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/comments?post=748"}],"version-history":[{"count":1,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/748\/revisions"}],"predecessor-version":[{"id":3974,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/posts\/748\/revisions\/3974"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media\/750"}],"wp:attachment":[{"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/media?parent=748"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/categories?post=748"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.techsolutionsinc.com\/wp-json\/wp\/v2\/tags?post=748"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}