{"id":4661,"date":"2019-06-04T12:18:29","date_gmt":"2019-06-04T11:18:29","guid":{"rendered":"https:\/\/www.lcn.com\/blog\/?p=4661"},"modified":"2021-07-05T17:35:12","modified_gmt":"2021-07-05T16:35:12","slug":"how-to-prevent-email-security-breaches","status":"publish","type":"post","link":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/","title":{"rendered":"How to prevent email security breaches"},"content":{"rendered":"<p>Over the last 30 years or so, <a href=\"https:\/\/www.lcn.com\/email-hosting\">email<\/a> has become an essential communication tool for businesses and individuals alike. But as with any system that relies on the internet, email does not come without risks. It\u2019s often the first line of attack for hackers attempting to breach the corporate perimeter.<\/p>\n<p>Because it\u2019s so widely used, familiarity with email means that people may not be fully alert to the risks that it presents. So what can organisations do to keep their email systems secure?<\/p>\n<h2>Gone phishing<\/h2>\n<p>One of the most common forms of email attack is phishing. This is used in a number of different cybercrime scenarios. Most commonly it can be employed to trick people into revealing their sign in details for a website, notably banks and other sites dealing in financial transactions.<\/p>\n<p>It can also be used to deliver malware by getting unsuspecting recipients to click on a link to an infected webpage.<\/p>\n<p>The whole idea of phishing emails is that in order to work, they have to appear genuine. The old days of badly spelled, poorly formatted phishing messages are largely gone. This makes attacks more difficult to detect and requires staff to be on their guard when dealing with unexpected communications.<\/p>\n<figure id=\"attachment_4667\" aria-describedby=\"caption-attachment-4667\" style=\"width: 1920px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4667 size-full\" src=\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/scam-3933004_1920.jpg\" alt=\"phishing cybercrime\" width=\"1920\" height=\"1114\" srcset=\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/scam-3933004_1920.jpg 1920w, https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/scam-3933004_1920-300x174.jpg 300w, https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/scam-3933004_1920-768x446.jpg 768w, https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/scam-3933004_1920-1024x594.jpg 1024w\" sizes=\"auto, (max-width: 1920px) 100vw, 1920px\" \/><figcaption id=\"caption-attachment-4667\" class=\"wp-caption-text\">Image by <a href=\"https:\/\/pixabay.com\/users\/mohamed_hassan-5229782\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3933004\">mohamed Hassan<\/a> from <a href=\"https:\/\/pixabay.com\/?utm_source=link-attribution&amp;utm_medium=referral&amp;utm_campaign=image&amp;utm_content=3933004\">Pixabay<\/a><\/figcaption><\/figure>\n<p>While security software can filter out some attacks, it\u2019s training and awareness that is the key here. Staff in departments such as finance are especially likely to be targeted as cyber criminals try to get fake invoices or payment requests through.<\/p>\n<p>It\u2019s also important that people practice good email hygiene and are not tempted to share jokes or memes that could introduce risk. Similarly, sending files as attachments &#8211; particularly if unencrypted &#8211; should be discouraged.<\/p>\n<p>Of course, there is another side to the phishing coin, which is when it\u2019s your customers that are the intended victims of attack and your brand name that is being used to trick them. Phishing works because it exploits basic human psychological weaknesses. Cyber criminals know who to target and which buttons to press to get them to respond.<\/p>\n<h2>Protecting your brand<\/h2>\n<p>One of the ways of helping to prevent your customers from being duped in this way is to use <a href=\"https:\/\/www.dmarcanalyzer.com\/dmarc\/\">DMARC<\/a> (Domain-based Message Authentication, Reporting and Conformance). This is a system that validates whether an email is actually coming from the domain name it appears to be from.<\/p>\n<p>Helping to eliminate attacks that \u2018spoof\u2019 the sender name to make it appear that they are coming from a legitimate source.<\/p>\n<p>Many of the leading mail systems providers including Google, Microsoft and Yahoo have contributed to the DMARC specification so as more businesses adopt it, there should be an impact on the volume of phishing email received. Messages that fail DMARC authentication are either filtered to a spam folder or rejected completely and not delivered.<\/p>\n<p>Senders get reports on messages sent using DMARC and can, therefore, see if any of their emails are failing authentication and adjust them accordingly.<\/p>\n<p>An alternative to DMARC is Sender Policy Framework (SPF). This allows you to publish a record of all the domains your business uses to send email. Mail services check against this list and will treat any mail purporting to come from you but not from a listed domain as spam.<\/p>\n<p>A third option is DomainKeys Identified Mail (<a href=\"https:\/\/en.wikipedia.org\/wiki\/DomainKeys_Identified_Mail\">DKIM<\/a>). This uses public key encryption to verify the domain of an email and check that it hasn\u2019t been tampered with in transit. The advantage of this is that the contents of the email are also secured.<\/p>\n<figure id=\"attachment_4669\" aria-describedby=\"caption-attachment-4669\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-4669 size-full\" src=\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/800px-DomainKeys_Identified_Mail_DKIM.svg_.png\" alt=\"brand protection cybercrime\" width=\"800\" height=\"455\" srcset=\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/800px-DomainKeys_Identified_Mail_DKIM.svg_.png 800w, https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/800px-DomainKeys_Identified_Mail_DKIM.svg_-300x171.png 300w, https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/800px-DomainKeys_Identified_Mail_DKIM.svg_-768x437.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><figcaption id=\"caption-attachment-4669\" class=\"wp-caption-text\">Ale2006-from-en [<a href=\"https:\/\/creativecommons.org\/licenses\/by-sa\/3.0\">CC BY-SA 3.0<\/a>], <a href=\"https:\/\/commons.wikimedia.org\/wiki\/File:DomainKeys_Identified_Mail_(DKIM).svg\">via Wikimedia Commons<\/a><\/figcaption><\/figure>\n<p>On the downside, you need to have a separate DNS entry and DKIM key for each service from which you send email. In addition to your own servers, this may include other services such as newsletter providers that send mail on your behalf. <a href=\"https:\/\/www.gov.uk\/government\/publications\/email-security-standards\">The Government offers guidance using mail authentication<\/a> and other tips on keeping your email secure on its website.<\/p>\n<h2>Protecting your information<\/h2>\n<p>If you need to send confidential information via email then keeping it secure is essential. Email in its basic form is not secure and there\u2019s a risk than any messages can be intercepted in transit.<\/p>\n<p>Intercepting data can be a valuable resource for cyber crime organisations, not just in terms of financial information but because of intellectual property and other material you might want to keep under wraps.<\/p>\n<p>We\u2019ve mentioned DKIM above, but there\u2019s another popular way of securing email message contents and that\u2019s <a href=\"https:\/\/www.openpgp.org\/\">PGP<\/a>. PGP (Pretty Good Privacy) has been around since the 1990s and has been continuously developed.<\/p>\n<p>To use PGP you need appropriate client software, or a plug-in such as Mailvelope for use with online mail services including Gmail and Outlook. PGP works by exchanging public keys between senders which, in conjunction with a private key, allow the contents of an email to be encrypted and then unscrambled on receipt.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Over the last 30 years or so, email has become an essential communication tool for businesses and individuals alike. But as with any system that relies on the internet, email&#8230; <a class=\"more-link\" href=\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\">Read more &rarr;<\/a><\/p>\n","protected":false},"author":31,"featured_media":4666,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[51],"tags":[],"class_list":["post-4661","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to prevent email security breaches - LCN.com<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to prevent email security breaches - LCN.com\" \/>\n<meta property=\"og:description\" content=\"Over the last 30 years or so, email has become an essential communication tool for businesses and individuals alike. But as with any system that relies on the internet, email... Read more &rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Grow a successful website with the LCN Business Hub\" \/>\n<meta property=\"article:publisher\" content=\"http:\/\/www.facebook.com\/lcndotcom\" \/>\n<meta property=\"article:published_time\" content=\"2019-06-04T11:18:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-05T16:35:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png\" \/>\n\t<meta property=\"og:image:width\" content=\"960\" \/>\n\t<meta property=\"og:image:height\" content=\"346\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Nathan Preedy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@lcndotcom\" \/>\n<meta name=\"twitter:site\" content=\"@lcndotcom\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Nathan Preedy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\"},\"author\":{\"name\":\"Nathan Preedy\",\"@id\":\"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069\"},\"headline\":\"How to prevent email security breaches\",\"datePublished\":\"2019-06-04T11:18:29+00:00\",\"dateModified\":\"2021-07-05T16:35:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\"},\"wordCount\":841,\"image\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\",\"url\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\",\"name\":\"How to prevent email security breaches - LCN.com\",\"isPartOf\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png\",\"datePublished\":\"2019-06-04T11:18:29+00:00\",\"dateModified\":\"2021-07-05T16:35:12+00:00\",\"author\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage\",\"url\":\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png\",\"contentUrl\":\"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png\",\"width\":960,\"height\":346,\"caption\":\"A guide to online security in 2019 for businesses\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"LCN.com\",\"item\":\"\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/www.lcn.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security\",\"item\":\"https:\/\/www.lcn.com\/blog\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"How to prevent email security breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lcn.com\/blog\/#website\",\"url\":\"https:\/\/www.lcn.com\/blog\/\",\"name\":\"Grow a successful website with the LCN Business Hub\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lcn.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069\",\"name\":\"Nathan Preedy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"url\":\"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"contentUrl\":\"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg\",\"caption\":\"Nathan Preedy\"},\"description\":\"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to prevent email security breaches - LCN.com","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/","og_locale":"en_GB","og_type":"article","og_title":"How to prevent email security breaches - LCN.com","og_description":"Over the last 30 years or so, email has become an essential communication tool for businesses and individuals alike. But as with any system that relies on the internet, email... Read more &rarr;","og_url":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/","og_site_name":"Grow a successful website with the LCN Business Hub","article_publisher":"http:\/\/www.facebook.com\/lcndotcom","article_published_time":"2019-06-04T11:18:29+00:00","article_modified_time":"2021-07-05T16:35:12+00:00","og_image":[{"width":960,"height":346,"url":"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png","type":"image\/png"}],"author":"Nathan Preedy","twitter_card":"summary_large_image","twitter_creator":"@lcndotcom","twitter_site":"@lcndotcom","twitter_misc":{"Written by":"Nathan Preedy","Estimated reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#article","isPartOf":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/"},"author":{"name":"Nathan Preedy","@id":"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069"},"headline":"How to prevent email security breaches","datePublished":"2019-06-04T11:18:29+00:00","dateModified":"2021-07-05T16:35:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/"},"wordCount":841,"image":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png","articleSection":["Security"],"inLanguage":"en-GB"},{"@type":"WebPage","@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/","url":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/","name":"How to prevent email security breaches - LCN.com","isPartOf":{"@id":"https:\/\/www.lcn.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png","datePublished":"2019-06-04T11:18:29+00:00","dateModified":"2021-07-05T16:35:12+00:00","author":{"@id":"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069"},"breadcrumb":{"@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#primaryimage","url":"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png","contentUrl":"https:\/\/www.lcn.com\/blog\/wp-content\/uploads\/2019\/06\/email-marketing-2362038_960_720.png","width":960,"height":346,"caption":"A guide to online security in 2019 for businesses"},{"@type":"BreadcrumbList","@id":"https:\/\/www.lcn.com\/blog\/how-to-prevent-email-security-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"LCN.com","item":"\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.lcn.com\/blog\/"},{"@type":"ListItem","position":3,"name":"Security","item":"https:\/\/www.lcn.com\/blog\/category\/security\/"},{"@type":"ListItem","position":4,"name":"How to prevent email security breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.lcn.com\/blog\/#website","url":"https:\/\/www.lcn.com\/blog\/","name":"Grow a successful website with the LCN Business Hub","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lcn.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Person","@id":"https:\/\/www.lcn.com\/blog\/#\/schema\/person\/e6493782266f4474f2c90dc96682d069","name":"Nathan Preedy","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","url":"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","contentUrl":"https:\/\/www.lcn.com\/blog\/wp-content\/plugins\/wp-user-avatars\/wp-user-avatars\/assets\/images\/mystery.jpg","caption":"Nathan Preedy"},"description":"Nathan has been with team.blue since 2005 and has a background in Technical Support. He is passionate about helping customers find the best product for them and use it to its full potential."}]}},"_links":{"self":[{"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/posts\/4661","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/users\/31"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/comments?post=4661"}],"version-history":[{"count":8,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/posts\/4661\/revisions"}],"predecessor-version":[{"id":5135,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/posts\/4661\/revisions\/5135"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/media\/4666"}],"wp:attachment":[{"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/media?parent=4661"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/categories?post=4661"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lcn.com\/blog\/wp-json\/wp\/v2\/tags?post=4661"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}