{"id":2851,"date":"2022-08-31T12:00:00","date_gmt":"2022-08-31T12:00:00","guid":{"rendered":"https:\/\/www.hostrw.com\/kp\/?p=2851"},"modified":"2022-07-04T16:00:52","modified_gmt":"2022-07-04T14:00:52","slug":"how-using-the-slam-method-can-improve-phishing-detection","status":"publish","type":"post","link":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/","title":{"rendered":"How Using the SLAM Method Can Improve Phishing Detection"},"content":{"rendered":"<p>There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.<\/p><p>Why has phishing remained such a large threat for so long? Because it continues to work. Scammers evolve their methods as technology progresses. They use AI-based tactics to make targeted phishing more efficient, for example.<\/p><p>If phishing didn\u2019t continue working, then scammers would move on to another type of attack. But that hasn\u2019t been the case. People continue to get tricked. They open malicious file attachments, click on dangerous links, and reveal passwords.<\/p><p><strong>In May of 2021, phishing attacks increased <a rel=\"noreferrer noopener\" href=\"https:\/\/blog.knowbe4.com\/phishing-attacks-surged-in-q2-2021\" target=\"_blank\">by 281%<\/a>. Then in June, they spiked another 284% higher.<\/strong><\/p><p>Studies show that as soon as <a href=\"https:\/\/securityboulevard.com\/2020\/10\/security-awareness-training-how-often-should-your-employees-get-retrained\/\" target=\"_blank\" rel=\"noreferrer noopener\">6 months after<\/a> training, phishing detection skills wane. Employees begin forgetting what they&#8217;ve learned, and cybersecurity suffers as a result.<\/p><p>Want to give employees a \u201chook\u201d they can use for memory retention? Introduce the SLAM method of phishing identification.<\/p><h2 class=\"wp-block-heading\">What is the SLAM Method for Phishing Identification?<\/h2><p>One of the mnemonic devices known to help people remember information is the use of an acronym. SLAM is an acronym for four key areas of an email message to check before trusting it.<\/p><p>These are:<\/p><p>S = Sender<br>L = Links<br>A = Attachments<br>M = Message text<\/p><p>By giving people the term \u201cSLAM\u201d to use, it\u2019s quicker for them to check suspicious email. This device helps them avoid missing something important. All they need to do use the cues in the acronym.<\/p><h3 class=\"wp-block-heading\">Check the Sender<\/h3><p>It\u2019s important to check the sender of an email thoroughly. Often scammers will either spoof an email address or use a look-alike. People often mistake a spoofed address for the real thing.<\/p><p>In this phishing email below, the email address domain is \u201c@emcom.bankofamerica.com.\u201d The scammer is impersonating Bank of America. This is one way that scammers try to trick you, by putting the real company\u2019s URL inside their fake one.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/Sender.png\" rel=\"lightbox[2851]\" alt=\"Check the Sender\" class=\"wp-image-835\" title=\"Check the Sender\" \/><\/figure><\/div><p>You can see that the email is very convincing. It has likely fooled many people into divulging their personal details. People applying for a credit card provide a Social Security Number, income, and more.<\/p><p>Doing a quick search on the email address, quickly reveals it to be a scam. And a trap used in both email and SMS phishing attacks.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/Email-Scam.png\" alt=\"Scam Email search\" class=\"wp-image-836\" title=\"Scam Email search\" \/><\/figure><\/div><p>It only takes a few seconds to type an email address into Google. This allows you to see if any scam warnings come up indicating a phishing email.<\/p><h3 class=\"wp-block-heading\">Hover Over Links Without Clicking<\/h3><p>Hyperlinks are popular to use in emails. They can often get past antivirus\/anti-malware filters. Those filters are looking for file attachments that contain malware. But a link to a malicious site doesn\u2019t contain any dangerous code. Instead, it links to a site that does.<\/p><p>Links can be in the form of hyperlinked words, images, and buttons in an email. When on a computer, it\u2019s important to hover over links without clicking on them to reveal the true URL. This often can immediately call out a fake email scam.<\/p><div class=\"wp-block-image\"><figure class=\"aligncenter size-full\"><img decoding=\"async\" src=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/Hyperlinks.png\" alt=\"Hover over links without clicking\" class=\"wp-image-837\" title=\"Hover over links without clicking\" \/><\/figure><\/div><p>When looking at email on a mobile device, it can be trickier to see the URL without clicking on it. There is no mouse like there is with a PC. In this case, it\u2019s best not to click the URL at all. Instead go to the purported site to check the validity of the message.<\/p><h3 class=\"wp-block-heading\">Never Open Unexpected or Strange File Attachments<\/h3><p>File attachments are still widely used in phishing emails. Messages may have them attached, promising a large sale order. The recipient might see a familiar word document and open it without thinking.<\/p><p>It\u2019s getting harder to know what file formats to avoid opening. Cybercriminals have become savvier about infecting all types of documents with malware. There have even been PDFs with malware embedded.<\/p><p>Never open strange or unexpected file attachments. Use an antivirus\/anti-malware application to scan all attachments before opening.<\/p><h3 class=\"wp-block-heading\">Read the Message Carefully<\/h3><p>We\u2019ve gotten great at scanning through text as technology has progressed. It helps us quickly process a lot of incoming information each day. But if you rush through a phishing email, you can miss some telltale signs that it\u2019s a fake.<\/p><p>Look at the phishing example posted above in the \u201cLinks\u201d section. There is a small error in grammar in the second sentence. Did you spot it?<\/p><p>It says, \u201cWe <strong>confirmation<\/strong> that your item has shipped,\u201d instead of \u201cWe confirm that your item has shipped.\u201d These types of errors can be hard to spot but are a big red flag that the email is not legitimate.<\/p><h2 class=\"wp-block-heading\">Get Help Combatting Phishing Attacks<\/h2><p>Both awareness training and security software can improve your defenses against phishing attacks. Contact us today to discuss your email security needs.<\/p><p><\/p><p>&#8212;<br><a href=\"https:\/\/pixabay.com\/vectors\/hack-fraud-map-code-computer-7109362\/\" target=\"_blank\" rel=\"noreferrer noopener\">Featured Image Credit<\/a><\/p><p>This Article has been Republished with Permission from <a rel=\"canonical noopener noreferrer\" href=\"https:\/\/thetechnologypress.com\/how-using-the-slam-method-can-improve-phishing-detection\/\" title=\"How Using the SLAM Method Can Improve Phishing Detection\" target=\"_blank\">The Technology Press.<\/a><\/p>","protected":false},"excerpt":{"rendered":"<p>There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.Why has phishing remained such a large threat &#8230;<\/p>\n","protected":false},"author":1,"featured_media":2855,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[80],"tags":[],"class_list":["post-2851","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/\" \/>\n<meta property=\"og:locale\" content=\"nl_NL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service\" \/>\n<meta property=\"og:description\" content=\"There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.Why has phishing remained such a large threat ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/\" \/>\n<meta property=\"og:site_name\" content=\"HostRW Computer Service\" \/>\n<meta property=\"article:published_time\" content=\"2022-08-31T12:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"865\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Roelof\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@hostrw\" \/>\n<meta name=\"twitter:site\" content=\"@hostrw\" \/>\n<meta name=\"twitter:label1\" content=\"Geschreven door\" \/>\n\t<meta name=\"twitter:data1\" content=\"Roelof\" \/>\n\t<meta name=\"twitter:label2\" content=\"Geschatte leestijd\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minuten\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/\"},\"author\":{\"name\":\"Roelof\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\"},\"headline\":\"How Using the SLAM Method Can Improve Phishing Detection\",\"datePublished\":\"2022-08-31T12:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/\"},\"wordCount\":836,\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"nl-NL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/\",\"name\":\"How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png\",\"datePublished\":\"2022-08-31T12:00:00+00:00\",\"inLanguage\":\"nl-NL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/how-using-the-slam-method-can-improve-phishing-detection\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2022\\\/07\\\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png\",\"width\":1280,\"height\":865,\"caption\":\"Free vector graphics of Hack\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#website\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"name\":\"HostRW Computer Service\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"nl-NL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#organization\",\"name\":\"HostRW Computer Service\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/wp-content\\\/uploads\\\/2015\\\/10\\\/hostrw-logo.png\",\"width\":189,\"height\":57,\"caption\":\"HostRW Computer Service\"},\"image\":{\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/hostrw\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/en\\\/#\\\/schema\\\/person\\\/7d687b2c46ac2974fb832a683a705abc\",\"name\":\"Roelof\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"nl-NL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g\",\"caption\":\"Roelof\"},\"url\":\"https:\\\/\\\/www.hostrw.com\\\/kp\\\/author\\\/roelof\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/","og_locale":"nl_NL","og_type":"article","og_title":"How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service","og_description":"There is a reason why phishing is usually at the top of the list for security awareness training. For the last decade or two, it has been the main delivery method for all types of attacks. Ransomware, credential theft, database breaches, and more launch via a phishing email.Why has phishing remained such a large threat ...","og_url":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/","og_site_name":"HostRW Computer Service","article_published_time":"2022-08-31T12:00:00+00:00","og_image":[{"width":1280,"height":865,"url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png","type":"image\/png"}],"author":"Roelof","twitter_card":"summary_large_image","twitter_creator":"@hostrw","twitter_site":"@hostrw","twitter_misc":{"Geschreven door":"Roelof","Geschatte leestijd":"4 minuten"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/#article","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/"},"author":{"name":"Roelof","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc"},"headline":"How Using the SLAM Method Can Improve Phishing Detection","datePublished":"2022-08-31T12:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/"},"wordCount":836,"publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png","articleSection":["Cybersecurity"],"inLanguage":"nl-NL"},{"@type":"WebPage","@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/","url":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/","name":"How Using the SLAM Method Can Improve Phishing Detection - HostRW Computer Service","isPartOf":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/#primaryimage"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png","datePublished":"2022-08-31T12:00:00+00:00","inLanguage":"nl-NL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/"]}]},{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/how-using-the-slam-method-can-improve-phishing-detection\/#primaryimage","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2022\/07\/How-Using-the-SLAM-Method-Can-Improve-Phishing-Detection.png","width":1280,"height":865,"caption":"Free vector graphics of Hack"},{"@type":"WebSite","@id":"https:\/\/www.hostrw.com\/kp\/en\/#website","url":"https:\/\/www.hostrw.com\/kp\/en\/","name":"HostRW Computer Service","description":"","publisher":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostrw.com\/kp\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"nl-NL"},{"@type":"Organization","@id":"https:\/\/www.hostrw.com\/kp\/en\/#organization","name":"HostRW Computer Service","url":"https:\/\/www.hostrw.com\/kp\/en\/","logo":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","contentUrl":"https:\/\/www.hostrw.com\/kp\/wp-content\/uploads\/2015\/10\/hostrw-logo.png","width":189,"height":57,"caption":"HostRW Computer Service"},"image":{"@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/hostrw"]},{"@type":"Person","@id":"https:\/\/www.hostrw.com\/kp\/en\/#\/schema\/person\/7d687b2c46ac2974fb832a683a705abc","name":"Roelof","image":{"@type":"ImageObject","inLanguage":"nl-NL","@id":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f7c9cd4db5ac1daef94bd4681ccdda0ebb3418fd8ff390d64eb68c6d5b7a5b75?s=96&d=mm&r=g","caption":"Roelof"},"url":"https:\/\/www.hostrw.com\/kp\/author\/roelof\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2851","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/comments?post=2851"}],"version-history":[{"count":1,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2851\/revisions"}],"predecessor-version":[{"id":2856,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/posts\/2851\/revisions\/2856"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media\/2855"}],"wp:attachment":[{"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/media?parent=2851"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/categories?post=2851"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostrw.com\/kp\/wp-json\/wp\/v2\/tags?post=2851"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}