{"id":2532,"date":"2023-10-26T13:00:00","date_gmt":"2023-10-26T17:00:00","guid":{"rendered":"https:\/\/inversetech.com\/?p=2532"},"modified":"2023-11-03T13:50:10","modified_gmt":"2023-11-03T17:50:10","slug":"you-know-your-business-is-under-attack-right-part-one-cybersecurity","status":"publish","type":"post","link":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/","title":{"rendered":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity"},"content":{"rendered":"\n\n\n\n[et_pb_section fb_built=&#8221;1&#8243; custom_padding_last_edited=&#8221;on|phone&#8221; _builder_version=&#8221;4.21.2&#8243; _module_preset=&#8221;default&#8221; custom_padding_tablet=&#8221;&#8221; custom_padding_phone=&#8221;10px||||false|false&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_row _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; custom_padding=&#8221;0px|||||&#8221; locked=&#8221;off&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_column type=&#8221;4_4&#8243; _builder_version=&#8221;4.21.0&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;][et_pb_text _builder_version=&#8221;4.22.2&#8243; _module_preset=&#8221;default&#8221; global_colors_info=&#8221;{}&#8221;]<p><span style=\"font-weight: 400;\">Running a business has never been easy, but let&#8217;s face it, it&#8217;s getting tougher every day. It doesn&#8217;t matter if you have a small, medium, or large business; you can be assured that sooner or later (or right now), your business will be under attack from one of multiple threats. Those business owners and managers who become complacent and believe they are not vulnerable are frankly fooling themselves. If you think your business is &#8220;safe,&#8221; please think again. Let&#8217;s talk about a few threats any business can face, beginning with cyber attacks. (Next time, we&#8217;ll address others.)\u00a0<\/span><\/p>\n<p><b>Cybersecurity Attacks:<\/b><span style=\"font-weight: 400;\">\u00a0This is the biggie since virtually all businesses are online \u2013 which can be a wide-open door to the bad guys. Let&#8217;s review some recent stats:\u00a0<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">On average, around\u00a0<\/span><b>30,000 websites are hacked every day<\/b><span style=\"font-weight: 400;\">\u00a0globally, out of which\u00a0<\/span><b>43%<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><b>are targeted at small businesses<\/b><span style=\"font-weight: 400;\">. This makes sense as smaller businesses are less likely to have the IT staff or the know-how to ward off attacks.\u00a0<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Because small businesses are &#8220;easy pickings,&#8221; they remain a prime target for cybercriminals. A study released in June 2023 found that\u00a0<\/span><b>61%<\/b><span style=\"font-weight: 400;\">\u00a0of SMBs (small and medium businesses) in the US and UK were successfully hit by a cyberattack in the past year.\u00a0<\/span><b>That&#8217;s over 50% of ALL SMBs were successfully hit last year!<\/b><span style=\"font-weight: 400;\">\u00a0<\/span><\/li>\n<\/ul>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>90% of attacks start with phishing<\/b><span style=\"font-weight: 400;\">, the fraudulent practice of sending emails or other messages pretending to be from reputable companies to induce individuals to reveal personal information such as passwords and credit card numbers.\u00a0<\/span><b>These criminals rely on your employees to click on a legit-looking email because A \u2013 your business&#8217; &#8220;cyber gates&#8221; were easily breached and B &#8211; because they haven&#8217;t been adequately trained to spot scam emails.<\/b><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The three top industries\u00a0<\/span><b>most<\/b><span style=\"font-weight: 400;\"> vulnerable to cyber attacks \u2013 can you guess why?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Healthcare<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\">Financial Services<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"2\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Retail<\/span><\/span><\/span>\n<p>The<b style=\"font-size: 14px;\">\u00a0above three industries will likely have loads of valuable, personal consumer data on hand.\u00a0<\/b><span style=\"font-size: 14px;\">Combined, they represent the mother lode for criminals looking to steal and then sell the data to the highest bidder. Are you ready to defend your business if this happens?<br \/><br \/><\/span><span style=\"font-size: 14px;\">If you&#8217;re a small business, the following statistic is frightening.\u00a0<\/span><b style=\"font-size: 14px;\">Roughly 60% of small businesses fold within six months of a cyberattack. This is because<\/b><span style=\"font-size: 14px;\"> the AVERAGE cost of an attack costs firms of all sizes $200,000. Can your business withstand that kind of hit? Studies show that despite its devastating effects, small and medium-sized companies have proven to be highly unprepared to face a ransomware attack.<\/span><\/p>\n<\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Congratulations if you have already taken the steps to engage an IT services company that can provide the right level of cyber security for your firm. If, however, your business, especially if it is small or medium-sized, is still hoping your subscription to an online anti-virus and spyware monitoring service is enough, well, it&#8217;s not. Those programs are generally okay for consumers working on their home computers, but you should\u00a0<\/span><b>not<\/b><span style=\"font-weight: 400;\">\u00a0rely on them for your business.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Why not reach out to us to talk about this?\u00a0We can conduct a thorough risk assessment to\u00a0<\/span><span style=\"font-weight: 400;\">identify how vulnerable your business is to attack. Then, if together we determine steps\u00a0<\/span><span style=\"font-weight: 400;\">that need to be taken to protect your business, we can put together a plan.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Or you can hope your business isn&#8217;t one of 50% of all SMBs hit this year. Call 800-854-2444\u00a0<\/span><span style=\"font-weight: 400;\">today to schedule a free consultation, or go online to learn more at\u00a0<\/span><a href=\"https:\/\/inversetech.com\/cybersecurity\/\"><span style=\"font-weight: 400;\">https:\/\/inversetech.com\/cybersecurity\/<\/span><\/a><\/p>[\/et_pb_text][\/et_pb_column][\/et_pb_row][\/et_pb_section]\n\n\n\n","protected":false},"excerpt":{"rendered":"<p>Running a business has never been easy, but let&#8217;s face it, it&#8217;s getting tougher every day. It doesn&#8217;t matter if you have a small, medium, or large business; you can be assured that sooner or later (or right now), your business will be under attack from one of multiple threats. Those business owners and managers [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2528,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":"1080","footnotes":""},"categories":[14],"tags":[],"class_list":["post-2532","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse<\/title>\n<meta name=\"description\" content=\"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn&#039;t enough.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse\" \/>\n<meta property=\"og:description\" content=\"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn&#039;t enough.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"Inverse\" \/>\n<meta property=\"article:published_time\" content=\"2023-10-26T17:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-11-03T17:50:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png\" \/>\n\t<meta property=\"og:image:width\" content=\"787\" \/>\n\t<meta property=\"og:image:height\" content=\"443\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Ray Richeson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ray Richeson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\"},\"author\":{\"name\":\"Ray Richeson\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\"},\"headline\":\"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity\",\"datePublished\":\"2023-10-26T17:00:00+00:00\",\"dateModified\":\"2023-11-03T17:50:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\"},\"wordCount\":670,\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png\",\"articleSection\":[\"Cyber Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\",\"url\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\",\"name\":\"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse\",\"isPartOf\":{\"@id\":\"https:\/\/inversetech.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png\",\"datePublished\":\"2023-10-26T17:00:00+00:00\",\"dateModified\":\"2023-11-03T17:50:10+00:00\",\"description\":\"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn't enough.\",\"breadcrumb\":{\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png\",\"width\":787,\"height\":443},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/inversetech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/inversetech.com\/#website\",\"url\":\"https:\/\/inversetech.com\/\",\"name\":\"Inverse\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/inversetech.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/inversetech.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/inversetech.com\/#organization\",\"name\":\"Inverse\",\"url\":\"https:\/\/inversetech.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"contentUrl\":\"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png\",\"width\":202,\"height\":130,\"caption\":\"Inverse\"},\"image\":{\"@id\":\"https:\/\/inversetech.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143\",\"name\":\"Ray Richeson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/inversetech.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g\",\"caption\":\"Ray Richeson\"},\"sameAs\":[\"http:\/\/Inversetech.com\"],\"url\":\"https:\/\/inversetech.com\/author\/inverse\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse","description":"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn't enough.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse","og_description":"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn't enough.","og_url":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/","og_site_name":"Inverse","article_published_time":"2023-10-26T17:00:00+00:00","article_modified_time":"2023-11-03T17:50:10+00:00","og_image":[{"width":787,"height":443,"url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png","type":"image\/png"}],"author":"Ray Richeson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Ray Richeson","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/"},"author":{"name":"Ray Richeson","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143"},"headline":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity","datePublished":"2023-10-26T17:00:00+00:00","dateModified":"2023-11-03T17:50:10+00:00","mainEntityOfPage":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/"},"wordCount":670,"publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"image":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png","articleSection":["Cyber Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/","url":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/","name":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity - Inverse","isPartOf":{"@id":"https:\/\/inversetech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png","datePublished":"2023-10-26T17:00:00+00:00","dateModified":"2023-11-03T17:50:10+00:00","description":"Protect your small business from the rising threat of cybersecurity attacks. Learn about the risks, statistics, and why relying on consumer-grade antivirus software isn't enough.","breadcrumb":{"@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#primaryimage","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2023\/10\/Business-Under-Attack-min.png","width":787,"height":443},{"@type":"BreadcrumbList","@id":"https:\/\/inversetech.com\/you-know-your-business-is-under-attack-right-part-one-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/inversetech.com\/"},{"@type":"ListItem","position":2,"name":"You Know Your Business is Under Attack \u2013 Right? Part One: Cybersecurity"}]},{"@type":"WebSite","@id":"https:\/\/inversetech.com\/#website","url":"https:\/\/inversetech.com\/","name":"Inverse","description":"","publisher":{"@id":"https:\/\/inversetech.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/inversetech.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/inversetech.com\/#organization","name":"Inverse","url":"https:\/\/inversetech.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/","url":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","contentUrl":"https:\/\/inversetech.com\/wp-content\/uploads\/2022\/03\/Inverse-logo-2022-FINAL.png","width":202,"height":130,"caption":"Inverse"},"image":{"@id":"https:\/\/inversetech.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/inversetech.com\/#\/schema\/person\/edbafe13ccf91780817046f06bbaf143","name":"Ray Richeson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/inversetech.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4d4b6d2efa1b24b9866bd5064bd6b64fabcdbbfa44e778ad5165dff4319d441?s=96&d=mm&r=g","caption":"Ray Richeson"},"sameAs":["http:\/\/Inversetech.com"],"url":"https:\/\/inversetech.com\/author\/inverse\/"}]}},"_links":{"self":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2532","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/comments?post=2532"}],"version-history":[{"count":6,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2532\/revisions"}],"predecessor-version":[{"id":2542,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/posts\/2532\/revisions\/2542"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media\/2528"}],"wp:attachment":[{"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/media?parent=2532"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/categories?post=2532"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/inversetech.com\/wp-json\/wp\/v2\/tags?post=2532"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}