{"id":22721,"date":"2021-04-05T07:05:00","date_gmt":"2021-04-05T07:05:00","guid":{"rendered":"https:\/\/www.experfy.com\/blog\/how-to-cyber-protect-your-iot-devices\/"},"modified":"2023-08-28T07:31:10","modified_gmt":"2023-08-28T07:31:10","slug":"how-to-cyber-protect-your-iot-devices","status":"publish","type":"post","link":"https:\/\/www.experfy.com\/blog\/iot\/how-to-cyber-protect-your-iot-devices\/","title":{"rendered":"How To Cyber Protect Your IoT Devices"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"22721\" class=\"elementor elementor-22721\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"has_eae_slider elementor-section elementor-top-section elementor-element elementor-element-3aabb21 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"3aabb21\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"has_eae_slider elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-f85ba5e\" data-id=\"f85ba5e\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-f0caeea elementor-widget elementor-widget-text-editor\" data-id=\"f0caeea\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Your smart home is vulnerable to cyber-attacks.<\/p>\n<p>Yes, you heard that well.<\/p>\n<p>Your single lightbulb could expose your Wi-Fi credentials to hackers.<\/p>\n<p>Read how to cyber protect your smart devices before you become a victim of hacking today.<\/p>\n<p>Undeniably, the Internet of Things devices have made our lives much simpler.<\/p>\n<p>These days, you can see what\u2019s happening around your home while you\u2019re away. You can switch the lights on\/off even when you\u2019re on the fly.<\/p>\n<p>In short, IoT devices have made what looked impossible in the past to be possible and much easier these days.<\/p>\n<p>Unfortunately, most IoT devices come with little or no built-in security.<\/p>\n<p>And to make the matter even worse, these devices collect and store personal information including your name, location, health records, etc.<\/p>\n<p>Think about what could happen to your personal data if hackers get access to your IoT device.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-487b97e elementor-widget elementor-widget-heading\" data-id=\"487b97e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Attacks Recorded in History<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-770161f elementor-widget elementor-widget-image\" data-id=\"770161f\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"628\" height=\"484\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-1-1-7.png\" class=\"attachment-large size-large wp-image-19075\" alt=\"How To Cyber Protect Your IoT Devices\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-1-1-7.png 628w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-1-1-7-300x231.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-1-1-7-610x470.png 610w\" sizes=\"(max-width: 628px) 100vw, 628px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><a href=\"https:\/\/pixabay.com\/photos\/hacker-silhouette-hack-anonymous-3342696\/\" target=\"_blank\" class=\"broken_link\" rel=\"noopener\">Pixabay<\/a><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-c7a93bb elementor-widget elementor-widget-text-editor\" data-id=\"c7a93bb\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Take a look at some of the reported cyber attacks on IoT devices as recorded in history.<\/p>\n<p>In October 2016, Dyn, a company that manages the World\u2019s DNS infrastructure was attacked by the <a href=\"https:\/\/www.csoonline.com\/article\/3258748\/the-mirai-botnet-explained-how-teen-scammers-and-cctv-cameras-almost-brought-down-the-internet.html\" target=\"_blank\" rel=\"noreferrer noopener\">Mirai botnet<\/a>. The attack affected most of the popular websites including CNN, Twitter, Netflix, and many others. By the end of that month, close to 100,000 IoT devices had been affected by this attack.<\/p>\n<p>In February 2017, smart toys made by Spiral Toys were hacked. The <a href=\"https:\/\/www.cnet.com\/news\/cloudpets-iot-smart-toy-flaws-hacking-kids-info-children-cybersecurity\/\" target=\"_blank\" rel=\"noreferrer noopener\">attack exposed<\/a> children\u2019s personal information and close to 2.2 million voice recordings.<\/p>\n<p>800,000+ users were affected and their email addresses and passwords were exposed.<\/p>\n<p>As if that\u2019s not all, in early 2019, <a href=\"https:\/\/www.nbcchicago.com\/investigations\/My-Blood-Ran-Cold-as-Smart-Cameras-Thermostat-Hacked-Homeowner-Says-505113061.html\" target=\"_blank\" rel=\"noreferrer noopener\">smart cameras and thermostat<\/a> belonging to some homeowner were hacked.<\/p>\n<p>The homeowner lost control over his smart cameras and thermostat.<\/p>\n<p>What does this mean for your IoT devices?<\/p>\n<p>It\u2019s time to strengthen the <a href=\"https:\/\/www.experfy.com\/blog\/bigdata-cloud\/5-strategies-to-ensure-online-security-among-your-employees\/\" target=\"_blank\" rel=\"noreferrer noopener\">security <\/a>of your smart gadgets.<\/p>\n<p>And given that by 2025 we expect to have 25 billion IoT devices, we should expect cyberattacks to increase tremendously.<\/p>\n<p>So, if there is time to learn how to cyber protect your IoT devices, then it\u2019s now.<\/p>\n<p>In this article, you\u2019re going to learn a few ways to secure your smart devices.<\/p>\n<p>The last thing you want to see is cybercriminals accessing data on your smart thermostat to know when you aren\u2019t around at your home. Paying a hefty ransom to restore your smart home system after an attack on your network through one of your IoT devices isn\u2019t a nice thing either.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-204b3af elementor-widget elementor-widget-heading\" data-id=\"204b3af\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">So here is how to cyber protect your IoT devices.<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-40d9af1 elementor-widget elementor-widget-heading\" data-id=\"40d9af1\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">1.&nbsp;&nbsp; Use Hard-To-Guess Passwords<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-df64fee elementor-widget elementor-widget-image\" data-id=\"df64fee\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t<figure class=\"wp-caption\">\n\t\t\t\t\t\t\t\t\t\t<img decoding=\"async\" width=\"627\" height=\"407\" src=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-2-1-5.png\" class=\"attachment-large size-large wp-image-19076\" alt=\"Passwords\" srcset=\"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-2-1-5.png 627w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-2-1-5-300x195.png 300w, https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2021\/05\/Untitled-2-1-5-610x396.png 610w\" sizes=\"(max-width: 627px) 100vw, 627px\" \/>\t\t\t\t\t\t\t\t\t\t\t<figcaption class=\"widget-image-caption wp-caption-text\"><a href=\"https:\/\/pixabay.com\/photos\/subscribe-registration-signup-3534409\/\" target=\"_blank\" class=\"broken_link\" rel=\"noopener\">Pixabay<\/a><\/figcaption>\n\t\t\t\t\t\t\t\t\t\t<\/figure>\n\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b487e42 elementor-widget elementor-widget-text-editor\" data-id=\"b487e42\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>This sounds a no-brainer but it is surprising to see how many cyber-attacks are reported every day due to weak passwords.<\/p>\n<p>When hackers gain access to your smart devices, you\u2019re finished.<\/p>\n<p>You will sweat by the time you restore your system and it can cost you a lot of money.<\/p>\n<p>To avoid this, use strong, complex, and hard-to-guess passwords to protect your smart devices and home networks.<\/p>\n<p>Stronger passwords have a combination of uppercase and lowercase, numbers, and special symbols.<\/p>\n<p>Also, use different passwords for different devices. Avoid saving your passwords electronically as well.<\/p>\n<p>If you have too many passwords that you think you can forget, use a <a href=\"https:\/\/www.cnet.com\/how-to\/best-password-manager-to-use-for-2020-1password-last-password-more-compared\/\" target=\"_blank\" rel=\"noreferrer noopener\">secure password manager<\/a>.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6d311dd elementor-widget elementor-widget-heading\" data-id=\"6d311dd\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">2.&nbsp;&nbsp; Keep Your IoT Devices Updated Regularly<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-55ee03c elementor-widget elementor-widget-text-editor\" data-id=\"55ee03c\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Every computer owner is guilty of postponing updates on their computer most of the time. Yes, it\u2019s when you open your computer, an \u201cUpdate Your System Now\u201d notification shows up, and you quickly click the \u201cUpdate Later\u201d button.<\/p>\n<p>This is easy to do for your computer but do this for your smart devices at your own peril.<\/p>\n<p>As mentioned by <a href=\"https:\/\/www.australianwritings.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">Australian Writings<\/a>, most IoT devices come with little or no built-in security.\u00a0 For that reason, you need to keep yours updated with the latest security patches.<\/p>\n<p>Regular updates also help to clear any security vulnerabilities that could have affected the previous version. Note that hackers are aware that users are constantly safeguarding their smart devices and are coming up with new hacking ways, so the best way to keep your IoT devices cyber protected is to update them frequently.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-95849d9 elementor-widget elementor-widget-heading\" data-id=\"95849d9\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">3.&nbsp;&nbsp; Use Two-Factor Authentication<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-52f4d62 elementor-widget elementor-widget-text-editor\" data-id=\"52f4d62\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>You must have used two-factor authentication when logging into your Gmail, social media, or other online accounts.<\/p>\n<p>Or perhaps you have added this to your debit card.<\/p>\n<p>Hackers use almost the same techniques to access your sensitive information by the way.<\/p>\n<p>Therefore, always use two-factor authentication for all your smart devices.<\/p>\n<p>The good thing about using this method is that you can tell whether someone tried to access your system.<\/p>\n<p>Typically, two-factor authentication is a method where you will have to get further permission to gain further access to your smart devices.<\/p>\n<p>For instance, you can activate this method so that when you want to access any of your smart devices, you get a code on your mobile phone that you enter before you proceed.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-aab22c8 elementor-widget elementor-widget-heading\" data-id=\"aab22c8\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">4.&nbsp;&nbsp; Change Default Login Credentials Immediately<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-87180f6 elementor-widget elementor-widget-text-editor\" data-id=\"87180f6\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Usually, your devices, the router, in particular, will come with a factory-default name and password.<\/p>\n<p>The only thing hackers need is to know your router model for them to hack it. You don\u2019t want this to happen as it will cost you a lot.<\/p>\n<p>As a rule, when you buy your router, change the default settings.<\/p>\n<p>Make sure you pick user names that don\u2019t relate to your location or anything that hackers can guess.<\/p>\n<p>According to the <a href=\"https:\/\/assignmentmasters.org\/\" target=\"_blank\" rel=\"noreferrer noopener\">assignment writing service<\/a> some people use their pet or child\u2019s names as their user names but this can be risky.<\/p>\n<p>Also, avoid using public Wi-Fi or if you have to, then avoid providing your personal information.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-b1b7c06 elementor-widget elementor-widget-heading\" data-id=\"b1b7c06\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">5.&nbsp;&nbsp; Avoid Sharing Your Network<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6ae9b3d elementor-widget elementor-widget-text-editor\" data-id=\"6ae9b3d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Another way to cyber protect your IoT devices is to assign them a separate network.<\/p>\n<p>In simple terms, avoid using your home or business network when accessing your smart devices.<\/p>\n<p>In the event your network is attacked (assuming you\u2019re using the same network for your smart devices and business), you\u2019re going to suffer a huge blow because everything of yours will be exposed including your bank data, health, and business records, etc.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-01fa295 elementor-widget elementor-widget-heading\" data-id=\"01fa295\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">6.&nbsp;&nbsp; Encrypt Your Network<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-f1913e4 elementor-widget elementor-widget-text-editor\" data-id=\"f1913e4\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Use WPA2 encryption for your network instead of the outdated WPA or WEP, as suggested by <a href=\"https:\/\/www.essaymama.com\/essay-writing-help\/\" target=\"_blank\" rel=\"noreferrer noopener\">Essaymama<\/a>.<\/p>\n<p>And if you have to use public Wi-Fi, make sure it uses strong encryption protocols.<\/p>\n<p>Along with this, keep your devices updated with the latest security patches.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-6e1cb68 elementor-widget elementor-widget-heading\" data-id=\"6e1cb68\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h3 class=\"elementor-heading-title elementor-size-default\">7.&nbsp;&nbsp; Keep Your Devices Physically Protected<\/h3>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-3b5d1b2 elementor-widget elementor-widget-text-editor\" data-id=\"3b5d1b2\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In most cases, you will be accessing your IoT devices via apps installed on your mobile.<\/p>\n<p>That means that in the event you lose your mobile phone, anyone who picks it may access your smart home.<\/p>\n<p>You need to implement physical security so that you don\u2019t lose any device you use to control your IoT devices.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-10e9f16 elementor-widget elementor-widget-heading\" data-id=\"10e9f16\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<h2 class=\"elementor-heading-title elementor-size-default\">Cyber Protect Your IoT Devices and Prevent Cybercrime<\/h2>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-5782a95 elementor-widget elementor-widget-text-editor\" data-id=\"5782a95\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>So, there you have it: 7 Ways on How to Cyber Protect Your IoT Devices.<\/p>\n<p>Do you have a smart device in your home? How do you keep it protected from cybercrime?<\/p>\n<p>Have you ever had a cyber attack on your IoT devices? What was your experience?<\/p>\n<p>Share your thoughts with us in the comment section.<\/p>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Read how to cyber protect your smart devices before you become a victim of hacking today.<\/p>\n","protected":false},"author":856,"featured_media":19077,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[195],"tags":[1473,127,536,287],"ppma_author":[3767],"class_list":["post-22721","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","tag-cyber-protect","tag-cybersecurity","tag-devices","tag-iot"],"authors":[{"term_id":3767,"user_id":856,"is_guest":0,"slug":"leon-collier","display_name":"Leon Collier","avatar_url":"https:\/\/www.experfy.com\/blog\/wp-content\/uploads\/2020\/07\/Leon-Collier-150x150.jpg","user_url":"https:\/\/www.aussiessay.com\/do-my-assignment.php","last_name":"Collier","first_name":"Leon","job_title":"","description":"Leon Collier is a blogger from the UK working for the <a href=\"https:\/\/www.assignmenthelper.com.au\/\">Australian assignment help<\/a> platform. If you need to <a href=\"https:\/\/www.bestdissertation.com\/buy-college-papers.html\">buy college papers<\/a> he is a perfect <a href=\"https:\/\/www.a-writer.com\">essay writer for you<\/a>. He loves to write about everything: pop-culture, history, travel, self-development, education, and marketing."}],"_links":{"self":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22721","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/users\/856"}],"replies":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/comments?post=22721"}],"version-history":[{"count":4,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22721\/revisions"}],"predecessor-version":[{"id":31671,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/posts\/22721\/revisions\/31671"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media\/19077"}],"wp:attachment":[{"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/media?parent=22721"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/categories?post=22721"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/tags?post=22721"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.experfy.com\/blog\/wp-json\/wp\/v2\/ppma_author?post=22721"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}