{"id":312,"date":"2017-10-31T06:00:32","date_gmt":"2017-10-31T11:00:32","guid":{"rendered":"https:\/\/rb-sns.com\/RB\/blog\/?p=312"},"modified":"2017-10-30T07:43:55","modified_gmt":"2017-10-30T12:43:55","slug":"security-suggestions-and-keeping-safe-from-hackers","status":"publish","type":"post","link":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/","title":{"rendered":"Security Suggestions and Keeping Safe From Hackers"},"content":{"rendered":"<p>The news is filled with stories about hackers and data theft. \u00a0Although they are not to be ignored, hackers can be avoided or thwarted with some common sense. \u00a0Let&#8217;s look at a few of these common-sense steps and some additional ways you can protect your self and site.<\/p>\n<h2>Secure Passwords<\/h2>\n<p>This is a common warning. \u00a0Nevertheless, the vast majority of passwords are anything but secure. \u00a0<a href=\"http:\/\/www.telegraph.co.uk\/technology\/2017\/01\/16\/worlds-common-passwords-revealed-using\/\">Studies have found<\/a> that there are a large number of &#8220;default&#8221; passwords used. \u00a0These include tough to guess ones like &#8220;password&#8221;, &#8220;123456&#8221;, and &#8220;qwerty.&#8221;<\/p>\n<p>This password laziness is being combatted by rules applied to a lot of sites. \u00a0This is where your password is required to include things like upper and lower case letters, a number, and maybe special characters. \u00a0This is a great way to define all of your passwords. \u00a0I find converting sentences to be great. \u00a0For example, you can start with, &#8220;My three kids are Billy, Sara, and Michael&#8221; becomes &#8220;m3kaBSaM.&#8221; \u00a0Note that I just took the first character of each word in the sentence and adjusted case while throwing in a number rather than word.<\/p>\n<h2>Avoid Phishing Attacks<\/h2>\n<p>These attacks are prevalent, but also easy to avoid. \u00a0They typically take the form of an &#8220;important&#8221; email from a co-worker or financial institution. \u00a0Some emails ask you to call a number and then that call will be a way for the scammer to get your information. \u00a0This is solved by not calling or at least not providing private information on a phone call to someone you are not sure of. \u00a0The other approach is to include an attached file that runs a program when opened. \u00a0Do not open attached files unless you are sure of the sender. \u00a0Even in those cases, make sure you have anti-virus software installed that will scan emails.<\/p>\n<p>These attacks are more effective than one would expect. \u00a0However, they prey on our lack of patience with email and our tendency to open and click on any attachment. \u00a0If you are more intentional in how you process your inbox you will see these attacks for what they are.<\/p>\n<h2>Going Deeper<\/h2>\n<p>When you have a website or application to secure it requires more than avoiding hackers. \u00a0In these instances, the hackers are likely to come to you. \u00a0Thus, steps need to\u00a0be taken to secure or harden your server.<\/p>\n<p>The good news is that there are a number of step-by-step guides freely available on the Internet. \u00a0There are even some great security\u00a0portals like the <a href=\"https:\/\/www.owasp.org\/index.php\/Main_Page\">Open Software Security Community<\/a>. \u00a0While most of these tutorials are well-intentioned, take a close look at the site before embracing any of the suggestions. \u00a0The best sources are from security companies and vendor sites. \u00a0When in doubt, do some checking to make sure the site is legitimate.<\/p>\n<p>There are some general steps that all of these sites will recommend.<\/p>\n<ul>\n<li>Remove identification data to make it harder for hackers to learn about your system<\/li>\n<li>Limit ways that the site or application can be accessed<\/li>\n<li>Use strong passwords and accounts<\/li>\n<li>Configure security measures like firewalls and anti-virus to the recommended settings<\/li>\n<li>Keep all software up-to-date<\/li>\n<\/ul>\n<p>These steps alone can make your site less a target. \u00a0This is important as no site is 100% secure, there are always holes. \u00a0When you make yourself less a target either by being hard for hackers to find or difficult to attack then they often will move on to easier targets. \u00a0This is the old idea of not being able to outrun a bear, just being able to outrun the other people the bear is chasing.<\/p>\n<h2>Be Safe<\/h2>\n<p>As we said at the top, common sense is the best approach to Internet security. \u00a0Hackers are not near as scary when you take these steps to reduce your risk. \u00a0If we all follow the steps above we would make life a lot more difficult for the typical hacker.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The news is filled with stories about hackers and data theft. \u00a0Although they are not to be ignored, hackers can be avoided or thwarted with some common sense. \u00a0Let&#8217;s look at a few of these common-sense steps and some additional ways you can protect your self and site. Secure Passwords This is a common warning. [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":314,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[8],"tags":[4,11],"class_list":["post-312","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-best-practices","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security Suggestions and Keeping Safe From Hackers -<\/title>\n<meta name=\"description\" content=\"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security Suggestions and Keeping Safe From Hackers -\" \/>\n<meta property=\"og:description\" content=\"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-10-31T11:00:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"512\" \/>\n\t<meta property=\"og:image:height\" content=\"417\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Rob Broadhead\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@rbcposts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Rob Broadhead\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\"},\"author\":{\"name\":\"Rob Broadhead\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/7a90d1b48e7e23c820769e418263da94\"},\"headline\":\"Security Suggestions and Keeping Safe From Hackers\",\"datePublished\":\"2017-10-31T11:00:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\"},\"wordCount\":652,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg\",\"keywords\":[\"best practices\",\"security\"],\"articleSection\":[\"General\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\",\"url\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\",\"name\":\"Security Suggestions and Keeping Safe From Hackers -\",\"isPartOf\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg\",\"datePublished\":\"2017-10-31T11:00:32+00:00\",\"description\":\"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.\",\"breadcrumb\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage\",\"url\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg\",\"contentUrl\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg\",\"width\":512,\"height\":417,\"caption\":\"security suggestions\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/rb-sns.com\/RB\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security Suggestions and Keeping Safe From Hackers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#website\",\"url\":\"https:\/\/rb-sns.com\/RB\/blog\/\",\"name\":\"\",\"description\":\"Technology That Serves the Business, Not the Other Way Around\",\"publisher\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/rb-sns.com\/RB\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#organization\",\"name\":\"RB Consulting, Inc.\",\"url\":\"https:\/\/rb-sns.com\/RB\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2016\/12\/RBLogo.png\",\"contentUrl\":\"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2016\/12\/RBLogo.png\",\"width\":256,\"height\":256,\"caption\":\"RB Consulting, Inc.\"},\"image\":{\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/robbroadhead\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/7a90d1b48e7e23c820769e418263da94\",\"name\":\"Rob Broadhead\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/bd120f8660b05d3d93d8889bc23970acf7146d65968ccea2a3f4ff25a38e28f9?s=96&d=mm&r=pg\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/bd120f8660b05d3d93d8889bc23970acf7146d65968ccea2a3f4ff25a38e28f9?s=96&d=mm&r=pg\",\"caption\":\"Rob Broadhead\"},\"description\":\"Rob is a seasoned software developer and technology professional. His background includes over 30 years of development. It includes enterprise systems on a wide variety of system architectures and platforms. His roles have included staff developer, director of development, architect, database administrator, and many points in between. He founded RB Consulting as a software development and implementation consulting company. However, after witnessing a significant number of poorly planned and designed projects, he altered the business focus. The primary focus is on helping customers put together well-designed project plans and navigating the vast sea of technology. This includes building teams\/departments to address IT needs in the future as well as for today. There is also still a software development wing of the company and implementation consulting. Rob received his MBA (with a concentration in e-Business) at the University of Phoenix. He also holds a BS in Computer Science from Rose-Hulman Institute of Technology. He has written and published a semi-biographical book, e-books, and a book on software development careers. He is a podcaster (The Building Better Developers\/Develpreneur podcast) and a regular contributor to Develpreneur, as well as his personal blog on this site.\",\"sameAs\":[\"https:\/\/develpreneur.com\",\"https:\/\/linkedin.com\/robbroadhead\",\"https:\/\/x.com\/rbcposts\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security Suggestions and Keeping Safe From Hackers -","description":"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/","og_locale":"en_US","og_type":"article","og_title":"Security Suggestions and Keeping Safe From Hackers -","og_description":"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.","og_url":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/","article_published_time":"2017-10-31T11:00:32+00:00","og_image":[{"width":512,"height":417,"url":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg","type":"image\/jpeg"}],"author":"Rob Broadhead","twitter_card":"summary_large_image","twitter_creator":"@rbcposts","twitter_misc":{"Written by":"Rob Broadhead","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#article","isPartOf":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/"},"author":{"name":"Rob Broadhead","@id":"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/7a90d1b48e7e23c820769e418263da94"},"headline":"Security Suggestions and Keeping Safe From Hackers","datePublished":"2017-10-31T11:00:32+00:00","mainEntityOfPage":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/"},"wordCount":652,"commentCount":0,"publisher":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/#organization"},"image":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg","keywords":["best practices","security"],"articleSection":["General"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/","url":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/","name":"Security Suggestions and Keeping Safe From Hackers -","isPartOf":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage"},"image":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage"},"thumbnailUrl":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg","datePublished":"2017-10-31T11:00:32+00:00","description":"Hackers are always in the news, but these security suggestions will help you avoid your risk without a lot of time of technical knowledge.","breadcrumb":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#primaryimage","url":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg","contentUrl":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2017\/10\/hacker.jpg","width":512,"height":417,"caption":"security suggestions"},{"@type":"BreadcrumbList","@id":"https:\/\/rb-sns.com\/RB\/blog\/security-suggestions-and-keeping-safe-from-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/rb-sns.com\/RB\/blog\/"},{"@type":"ListItem","position":2,"name":"Security Suggestions and Keeping Safe From Hackers"}]},{"@type":"WebSite","@id":"https:\/\/rb-sns.com\/RB\/blog\/#website","url":"https:\/\/rb-sns.com\/RB\/blog\/","name":"","description":"Technology That Serves the Business, Not the Other Way Around","publisher":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/rb-sns.com\/RB\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/rb-sns.com\/RB\/blog\/#organization","name":"RB Consulting, Inc.","url":"https:\/\/rb-sns.com\/RB\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2016\/12\/RBLogo.png","contentUrl":"https:\/\/rb-sns.com\/RB\/blog\/wp-content\/uploads\/2016\/12\/RBLogo.png","width":256,"height":256,"caption":"RB Consulting, Inc."},"image":{"@id":"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/in\/robbroadhead"]},{"@type":"Person","@id":"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/7a90d1b48e7e23c820769e418263da94","name":"Rob Broadhead","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/rb-sns.com\/RB\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/bd120f8660b05d3d93d8889bc23970acf7146d65968ccea2a3f4ff25a38e28f9?s=96&d=mm&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/bd120f8660b05d3d93d8889bc23970acf7146d65968ccea2a3f4ff25a38e28f9?s=96&d=mm&r=pg","caption":"Rob Broadhead"},"description":"Rob is a seasoned software developer and technology professional. His background includes over 30 years of development. It includes enterprise systems on a wide variety of system architectures and platforms. His roles have included staff developer, director of development, architect, database administrator, and many points in between. He founded RB Consulting as a software development and implementation consulting company. However, after witnessing a significant number of poorly planned and designed projects, he altered the business focus. The primary focus is on helping customers put together well-designed project plans and navigating the vast sea of technology. This includes building teams\/departments to address IT needs in the future as well as for today. There is also still a software development wing of the company and implementation consulting. Rob received his MBA (with a concentration in e-Business) at the University of Phoenix. He also holds a BS in Computer Science from Rose-Hulman Institute of Technology. He has written and published a semi-biographical book, e-books, and a book on software development careers. He is a podcaster (The Building Better Developers\/Develpreneur podcast) and a regular contributor to Develpreneur, as well as his personal blog on this site.","sameAs":["https:\/\/develpreneur.com","https:\/\/linkedin.com\/robbroadhead","https:\/\/x.com\/rbcposts"]}]}},"_links":{"self":[{"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/posts\/312","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/comments?post=312"}],"version-history":[{"count":4,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/posts\/312\/revisions"}],"predecessor-version":[{"id":317,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/posts\/312\/revisions\/317"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/media\/314"}],"wp:attachment":[{"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/media?parent=312"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/categories?post=312"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/rb-sns.com\/RB\/blog\/wp-json\/wp\/v2\/tags?post=312"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}