{"id":2767,"date":"2022-03-10T12:00:00","date_gmt":"2022-03-10T11:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2767"},"modified":"2022-05-04T14:42:30","modified_gmt":"2022-05-04T12:42:30","slug":"6-ways-to-combat-social-phishing-attacks","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/","title":{"rendered":"6 Ways to Combat Social Phishing Attacks"},"content":{"rendered":"<p>Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly.<\/p><p>In recent years, phishing over social media has skyrocketed <a href=\"https:\/\/inspiredelearning.com\/resource\/social-media-phishing-infographic\/\">by 500%<\/a>. There has also been a 100% increase in fraudulent social media accounts.<\/p><p>Phishing over social media often tricks the victims because people tend to let their guard down when on social platforms like Facebook, Instagram, Twitter, and LinkedIn. They\u2019re socializing and not looking for phishing scams.<\/p><p>However, phishing scammers are out there looking for you and will reach out via friend requests and direct messages. Learn several ways you can secure your social media use to avoid these types of covert attacks.<\/p><h3 class=\"wp-block-heading\"><strong>Make Your Profile Private on Social Platforms<\/strong><\/h3><p>Phishing scammers love public profiles on social media because not only can they gather intel on you to strike up a conversation, but they can also clone your profile and put up a fake page for phishing your connections.<\/p><p>Criminals do this in order to try to connect with those on your friends or connections list to send social phishing links that those targets will be more likely to click because they believe it\u2019s from someone they know.<\/p><p>You can limit your risk by going into your profile and making it private to your connections only. This means that only someone that you\u2019ve connected with can see your posts and images, not the general public.<\/p><p>For sites like LinkedIn where many people network for business, you might still want to keep your profile public, but you can follow the other tips below to reduce your risk.<\/p><h3 class=\"wp-block-heading\"><strong>Hide Your Contacts\/Friends List<\/strong><\/h3><p>You can keep social phishing scammers from trying to use your social media profile to get to your connections by hiding your friends or connections list. Platforms like <a href=\"https:\/\/www.linkedin.com\/help\/linkedin\/answer\/52\/who-can-see-your-connections?lang=en\">LinkedIn<\/a> and <a href=\"https:\/\/www.facebook.com\/help\/115450405225661\">Facebook<\/a> both give you this privacy option.&nbsp;<\/p><p>Just be aware that this does not keep scammers from seeing you as a friend or connection on someone else\u2019s profile unless they too have hidden their friends list.<\/p><h3 class=\"wp-block-heading\"><strong>Be Wary of Links Sent via Direct Message &amp; in Posts<\/strong><\/h3><p>Links are the preferred way to deliver phishing attacks, especially over social media. Links in social posts are often shortened, making it difficult for someone to know where they are being directed until they get there. This makes it even more dangerous to click links you see on a social media platform.<\/p><p>A scammer might chat you up on LinkedIn to inquire about your business offerings and give you a link that they say is to their website. Unless you know the source to be legitimate, do not click links sent via direct message or in social media posts. They could be leading to a phishing site that does a drive-by download of malware onto your device.<\/p><p>Even if one of your connections shares a link, be sure to research where it is coming from. People often share posts in their own feeds because they like a meme or picture on the post, but they never take the time to check whether the source can be trusted.<\/p><h3 class=\"wp-block-heading\"><strong>Don\u2019t Participate in Social Media Surveys or Quizzes<\/strong><\/h3><p>While it may be fun to know what Marvel superhero or Disney princess you are, stay away from quizzes on social media. They\u2019re often designed as a ploy to gather data on you. Data that could be used for targeted phishing attacks or identity theft.<\/p><p>The <a href=\"https:\/\/en.wikipedia.org\/wiki\/Facebook%E2%80%93Cambridge_Analytica_data_scandal\">Cambridge Analytica scandal<\/a> that impacted the personal data of millions of Facebook users did not happen all that long ago. It was found that the company was using surveys and quizzes to collect information on users without their consent.<\/p><p>While this case was high-profile, they\u2019re by no means the only ones that play loose and fast with user data and take advantage of social media to gather as much as they can.<\/p><p>It\u2019s best to avoid any types of surveys or quizzes on any social media platform because once your personal data is out there, there is no getting it back.<\/p><h3 class=\"wp-block-heading\"><strong>Avoid Purchasing Directly from Ads on Facebook or Instagram<\/strong><\/h3><p>Many companies advertise on social media legitimately, but unfortunately, many scammers use the platforms as well for credit card fraud and identity theft.<\/p><p>If you see something that catches your eye in a Facebook or Instagram ad, go to the advertiser\u2019s website directly to check it out, do not click through the social ad.<\/p><h3 class=\"wp-block-heading\"><strong>Research Before You Accept a Friend Request<\/strong><\/h3><p>It can be exciting to get a connection request on a social media platform. It could mean a new business connection or connecting with someone from your Alma mater. But this is another way that phishing scammers will look to take advantage of you. They\u2019ll try to connect to you which can be a first step before reaching out direct via DM.<\/p><p>Do not connect with friend requests without first checking out the person on the site and online using a search engine. If you see that their timeline only has pictures of themself and no posts, that\u2019s a big red flag that you should decline the request.<\/p><h2 class=\"wp-block-heading\"><strong>Can Your Devices Handle a Phishing Link or File?<\/strong><\/h2><p>It\u2019s important to safeguard your devices with things like DNS filtering, managed antivirus, email filtering, and more. This will help protect you if you happen to click on a phishing link.<\/p><p>Find out how we can help!<\/p><p><\/p><p>&#8212;<br><a href=\"https:\/\/pixabay.com\/vectors\/phishing-credentials-data-login-6573326\/\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p><p><\/p><p>This Article has been Republished with Permission from <a rel=\"canonical noopener noreferrer\" href=\"https:\/\/thetechnologypress.com\/6-ways-to-combat-social-phishing-attacks\/\" title=\"6 Ways to Combat Social Phishing Attacks\" target=\"_blank\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly.In recent years, phishing over social media has skyrocketed by 500%. There has also been a 100% increase in fraudulent social media &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2768,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80],"tags":[],"class_list":["post-2767","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>6 Ways to Combat Social Phishing Attacks - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Ways to Combat Social Phishing Attacks - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly.In recent years, phishing over social media has skyrocketed by 500%. There has also been a 100% increase in fraudulent social media ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-10T11:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-05-04T12:42:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"989\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"6 Ways to Combat Social Phishing Attacks\",\"datePublished\":\"2022-03-10T11:00:00+00:00\",\"dateModified\":\"2022-05-04T12:42:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/\"},\"wordCount\":940,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/\",\"name\":\"6 Ways to Combat Social Phishing Attacks - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png\",\"datePublished\":\"2022-03-10T11:00:00+00:00\",\"dateModified\":\"2022-05-04T12:42:30+00:00\",\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/6-ways-to-combat-social-phishing-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png\",\"width\":1280,\"height\":989,\"caption\":\"Phishing, Credentials, Data, Login, Password, Internet\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"6 Ways to Combat Social Phishing Attacks - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/","og_locale":"nl_NL","og_type":"article","og_title":"6 Ways to Combat Social Phishing Attacks - HostRW Computer Service","og_description":"Phishing is the number one method of attack delivery for everything from ransomware to credential theft. We are very aware of it coming by email, but other types of phishing have been growing rapidly.In recent years, phishing over social media has skyrocketed by 500%. There has also been a 100% increase in fraudulent social media ...","og_url":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-03-10T11:00:00+00:00","article_modified_time":"2022-05-04T12:42:30+00:00","og_image":[{"width":1280,"height":989,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png","type":"image\/png"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Geschreven door":"Roelof","Geschatte leestijd":"5 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"6 Ways to Combat Social Phishing Attacks","datePublished":"2022-03-10T11:00:00+00:00","dateModified":"2022-05-04T12:42:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/"},"wordCount":940,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png","articleSection":["Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/","url":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/","name":"6 Ways to Combat Social Phishing Attacks - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png","datePublished":"2022-03-10T11:00:00+00:00","dateModified":"2022-05-04T12:42:30+00:00","inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/6-ways-to-combat-social-phishing-attacks\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/05\/6-Ways-to-Combat-Social-Phishing-Attacks-raw-image-1.png","width":1280,"height":989,"caption":"Phishing, Credentials, Data, Login, Password, Internet"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2767","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/comments?post=2767"}],"version-history":[{"count":1,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2767\/revisions"}],"predecessor-version":[{"id":2769,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2767\/revisions\/2769"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media\/2768"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media?parent=2767"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/categories?post=2767"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/tags?post=2767"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}