{"id":355,"date":"2017-11-27T05:02:00","date_gmt":"2017-11-27T05:02:00","guid":{"rendered":"https:\/\/testserver.eminenture.co.in\/test\/MultitectIT\/blog\/?p=355"},"modified":"2025-04-30T10:02:49","modified_gmt":"2025-04-30T10:02:49","slug":"do-you-know-easy-it-solutions-to-save-sensitive-email-data","status":"publish","type":"post","link":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/","title":{"rendered":"Do You Know Easy IT Solutions to Save Sensitive Email Data?"},"content":{"rendered":"\n<p>Would you ever like to recall lethal ransomware attacks of WannaCry and Petya?<\/p>\n\n\n\n<p>They unleashed their deadliest aftereffects upon 100+ countries\u2019 system users.&nbsp; The keyboard gave up its motion. The screen stayed frozen. Millions of data was encrypted. What\u2019s emerging on the screen was the message to pay ransom. &nbsp;Cybercrime police got decipher traces of hackers. Cyber-bully is, now, at its peak.<\/p>\n\n\n\n<!--more-->\n\n\n\n<p><strong>What did hackers want as ransom<\/strong>?<\/p>\n\n\n\n<p>The Bitcoins-the virtual money.<\/p>\n\n\n\n<p>However, this cryptocurrency was coined for anonymous transaction between two parties. The third party verification was not needed. This currency was evolved for the good reasons. But hackers derived filthy practices of molesting innocents.&nbsp;<\/p>\n\n\n\n<p><strong>Biggest Blow:<\/strong><\/p>\n\n\n\n<p>During all these cyber-attacks, the stealing of contacts from the inbox was the worst. Your own emails became hacker\u2019s whistleblower. Many organisations lost millions of data.<\/p>\n\n\n\n<p><strong>The lesson:<\/strong><\/p>\n\n\n\n<p>Emails are vulnerable. Encrypt them.<\/p>\n\n\n\n<p>It\u2019s really scary when some anonymous one peeps into your sensitive details. It can be your back account username; your password; your account number or health details.<\/p>\n\n\n\n<p>Would you ever like to see your sensitive data going public?\u00a0I\u2019m sure none would ever push the \u2018like\u2019 button to this question.<\/p>\n\n\n\n<p>E<strong>mails-the repository of sensitive data:<\/strong><\/p>\n\n\n\n<p>With the boom of automation, the messaging is digitized. Won\u2019t you believe?<\/p>\n\n\n\n<p>Look at these factual stats of a survey report published n techcrunch in 2017:<\/p>\n\n\n\n<p>These stats clearly indicate that messaging is shifted to the digital landscape. It\u2019s widespread. And it\u2019s irresistible as well.<\/p>\n\n\n\n<p>Now answer-won\u2019t you obey what the hacker would say to do? Of course, you\u2019ll follow just like a helpless puppet. It\u2019s so because you want to save your sensitive data from going public. It\u2019s really hard to think of all this happening. Many organizations bet on multiple&nbsp;<strong>IT services to simplify and secure their back office work<\/strong>. But just a patch reverses their efforts.<\/p>\n\n\n\n<p>So! How would you take preventive measures?&nbsp; &nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>I\u2019m asking for preventive measure because decryption lies in the hands of hackers. Until and unless you pay the bitcoins, your email data would be encrypted.<\/p>\n\n\n\n<p>Such evil practice can be stopped. You can halt it.<\/p>\n\n\n\n<p><strong>How to save email data from hackers?<\/strong><\/p>\n\n\n\n<p>As told above, end-to-end encryption can stop all these filthy malware\/ransomware attacks.&nbsp; This method converts the data into incomprehensive form. Not even you can understand it unless you decrypt it with the key.<\/p>\n\n\n\n<p>The key would be a unique code that can unlock the encrypted data. So, what you can do is to go for this encryption. Then, only you and the recipient would be able to unlock it using the key.<\/p>\n\n\n\n<p><strong>Example:&nbsp;<\/strong>Whatsapp; it applies encryption key to the unseen data. And the key to decrypt it would be vulnerable to the authentic users only.<\/p>\n\n\n\n<p>Isn\u2019t it a great idea to hide your personal details!&nbsp;<\/p>\n\n\n\n<p>There are many software on the internet that assure this\u00a0<a href=\"https:\/\/www.multitechit.com.au\/it-support-consulting-services-gold-coast.php\"><strong>IT solution<\/strong><\/a>\u00a0of end-to-end-encryption. I\u2019ve done it. And the result was amazing. I got a number of this service provider.<\/p>\n\n\n\n<p>Here is the list of a few ones:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>PKWARE<\/li>\n\n\n\n<li>Virtru<\/li>\n\n\n\n<li>StartMail<\/li>\n\n\n\n<li>Send 2.0<br>Vaporstream<\/li>\n\n\n\n<li>Enlocked<\/li>\n\n\n\n<li>Privatesky&nbsp;&nbsp;<\/li>\n\n\n\n<li>Digital Guardian<\/li>\n\n\n\n<li>Gpg4win<\/li>\n\n\n\n<li>Voltage HPE SecureMail<\/li>\n<\/ul>\n\n\n\n<p><strong>Why end-to-end encryption for email data?<\/strong><\/p>\n\n\n\n<p>It runs two-factor authentication.&nbsp; Whether it\u2019s sending or receiving, this method of authentication asks for the key to unlock the message. Then only, it comes to readable form.<\/p>\n\n\n\n<p>It\u2019s like unlocking your own mobile phone by inputting the set pattern. And then, decode the way to photo-gallery.<\/p>\n\n\n\n<p>What user has to do is to provide password for login. Then, use the private key. Subsequent to sending, the recipient would require proof to prove its authentic recipient. He would receive the code via email or SMS on mobile phone. Then, the authentication will meet its end process.<\/p>\n\n\n\n<p><strong>Another way to encryption:<\/strong><\/p>\n\n\n\n<p>There is another way called PGP. It stands for&nbsp;<strong>pretty good privacy.&nbsp;<\/strong>&nbsp;The sender can deliver the email by using public key.&nbsp; On the contrary, the recipient would have to provide private key to decrypt.&nbsp; Once it is entered, the whole email will be open. For example, Mailvelop that is compatible with the Google and Firefox.&nbsp;<\/p>\n\n\n\n<p>However, upgrading versions of Windows can keep hacking at bay. But still, prevention is better than cure. Bear this fact in mind!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Would you ever like to recall lethal ransomware attacks of WannaCry and Petya? They unleashed their deadliest aftereffects upon 100+ countries\u2019 system users.&nbsp; The keyboard gave up its motion. The screen stayed frozen. Millions of data was encrypted. What\u2019s emerging on the screen was the message to pay ransom. &nbsp;Cybercrime police got decipher traces of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":356,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-355","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.8 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Do You Know IT Solutions to Save Sensitive Email Data? - MTIT<\/title>\n<meta name=\"description\" content=\"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Do You Know IT Solutions to Save Sensitive Email Data? - MTIT\" \/>\n<meta property=\"og:description\" content=\"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Multitech Blog - Tech &amp; Business Insights\" \/>\n<meta property=\"article:published_time\" content=\"2017-11-27T05:02:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-30T10:02:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"940\" \/>\n\t<meta property=\"og:image:height\" content=\"788\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\"},\"headline\":\"Do You Know Easy IT Solutions to Save Sensitive Email Data?\",\"datePublished\":\"2017-11-27T05:02:00+00:00\",\"dateModified\":\"2025-04-30T10:02:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\"},\"wordCount\":753,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\",\"name\":\"Do You Know IT Solutions to Save Sensitive Email Data? - MTIT\",\"isPartOf\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg\",\"datePublished\":\"2017-11-27T05:02:00+00:00\",\"dateModified\":\"2025-04-30T10:02:49+00:00\",\"author\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\"},\"description\":\"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg\",\"contentUrl\":\"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg\",\"width\":940,\"height\":788,\"caption\":\"Do You Know Easy IT Solutions to Save Sensitive Email Data?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.multitechit.com.au\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Do You Know Easy IT Solutions to Save Sensitive Email Data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#website\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/\",\"name\":\"Multitech Blog - Tech &amp; Business Insights\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.multitechit.com.au\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"description\":\"Explore expert articles and resources designed to help businesses leverage technology for success and innovation.\",\"url\":\"https:\/\/www.multitechit.com.au\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Do You Know IT Solutions to Save Sensitive Email Data? - MTIT","description":"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/","og_locale":"en_US","og_type":"article","og_title":"Do You Know IT Solutions to Save Sensitive Email Data? - MTIT","og_description":"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.","og_url":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/","og_site_name":"Multitech Blog - Tech &amp; Business Insights","article_published_time":"2017-11-27T05:02:00+00:00","article_modified_time":"2025-04-30T10:02:49+00:00","og_image":[{"width":940,"height":788,"url":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg","type":"image\/jpeg"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#article","isPartOf":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/"},"author":{"name":"admin","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1"},"headline":"Do You Know Easy IT Solutions to Save Sensitive Email Data?","datePublished":"2017-11-27T05:02:00+00:00","dateModified":"2025-04-30T10:02:49+00:00","mainEntityOfPage":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/"},"wordCount":753,"commentCount":0,"image":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/","url":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/","name":"Do You Know IT Solutions to Save Sensitive Email Data? - MTIT","isPartOf":{"@id":"https:\/\/www.multitechit.com.au\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage"},"image":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg","datePublished":"2017-11-27T05:02:00+00:00","dateModified":"2025-04-30T10:02:49+00:00","author":{"@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1"},"description":"IT solutions enhance software security, but hackers exploit vulnerabilities. End-to-end encryption is emerging as the best tool to combat such threats.","breadcrumb":{"@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#primaryimage","url":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg","contentUrl":"https:\/\/www.multitechit.com.au\/blog\/wp-content\/uploads\/2024\/04\/1711271216441.jpg","width":940,"height":788,"caption":"Do You Know Easy IT Solutions to Save Sensitive Email Data?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.multitechit.com.au\/blog\/do-you-know-easy-it-solutions-to-save-sensitive-email-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.multitechit.com.au\/blog\/"},{"@type":"ListItem","position":2,"name":"Do You Know Easy IT Solutions to Save Sensitive Email Data?"}]},{"@type":"WebSite","@id":"https:\/\/www.multitechit.com.au\/blog\/#website","url":"https:\/\/www.multitechit.com.au\/blog\/","name":"Multitech Blog - Tech &amp; Business Insights","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.multitechit.com.au\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/fa92596dcf02b0bb5e638a382206c4c1","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.multitechit.com.au\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ceba3808ea84d6683a9516c8dc1ee5bcdd2dc14a6768e96c7de704a40c5eb1e?s=96&d=mm&r=g","caption":"admin"},"description":"Explore expert articles and resources designed to help businesses leverage technology for success and innovation.","url":"https:\/\/www.multitechit.com.au\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/355","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/comments?post=355"}],"version-history":[{"count":3,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/355\/revisions"}],"predecessor-version":[{"id":675,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/posts\/355\/revisions\/675"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/media\/356"}],"wp:attachment":[{"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/media?parent=355"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/categories?post=355"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.multitechit.com.au\/blog\/wp-json\/wp\/v2\/tags?post=355"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}