{"id":14613,"date":"2024-10-07T09:16:08","date_gmt":"2024-10-07T13:16:08","guid":{"rendered":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_1-copy\/"},"modified":"2024-10-07T09:30:06","modified_gmt":"2024-10-07T13:30:06","slug":"cyber_security_2024_week_2","status":"publish","type":"post","link":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/","title":{"rendered":"Cyber Security Awareness Month | Week 2"},"content":{"rendered":"<h2>Avoid Phishing Scams with Three Simple Tips<\/h2>\n<p>Phishing scams are online messages designed to look like they\u2019re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to malware or a scammer looking for our personal data. The good news is we can take precautions to protect our important data. Learn to recognize the signs and report phishing to protect devices and data.<\/p>\n<p>&nbsp;<\/p>\n<ol>\n<li><strong>Recognize Common Signs<\/strong> | Be wary of requests from unknown parties, especially if they ask for money or other sensitive information.<\/li>\n<\/ol>\n<p style=\"text-align: center;\">\u2022 Urgent or emotionally appealing language<br \/>\n\u2022 Requests to send personal or financial information<br \/>\n\u2022 Unexpected attachments<br \/>\n\u2022 Untrusted shortened URLs<br \/>\n\u2022 Email addresses that do not match the supposed sender<br \/>\n\u2022 Poor writing\/misspellings (less common)<\/p>\n<ol>\n<li><strong>Resist and Report<\/strong> | Report suspicious messages by using the \u201creport spam\u201d feature. If the message is designed to resemble an organization you trust, report the message by alerting the organization using their contact information found on their webpage. You can also forward your email to support@sjtechies.com for one of our Security Team members to review.<\/li>\n<li><strong>Delete<\/strong> | Delete the message. Don\u2019t reply or click on any attachment or link, including any \u201cunsubscribe\u201d link. The unsubscribe button could also carry a link used for phishing. <strong>Just delete<\/strong>.<\/li>\n<\/ol>\n<h3 style=\"text-align: center;\">If a message looks suspicious, it\u2019s probably phishing.<\/h3>\n<p>&nbsp;<\/p>\n<p><strong>Have questions?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p>Our\u00a0team is here to help. Call us at: 856-745-9990 or visit: <a href=\"https:\/\/southjerseytechies.net\/\" target=\"_blank\" rel=\"noopener\">https:\/\/southjerseytechies.net<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/\">South Jersey Techies, LLC<\/a>\u00a0is a full\u00a0<a href=\"https:\/\/southjerseytechies.net\/\">Managed Web and IT Services<\/a>\u00a0Company located in Marlton, NJ providing\u00a0<a href=\"https:\/\/southjerseytechies.net\/business-it-services\/\">IT Services<\/a>,\u00a0<a href=\"https:\/\/southjerseytechies.net\/managed-it-services\/\">Managed IT Services<\/a>,\u00a0<a href=\"https:\/\/southjerseytechies.net\/website-services\/design\/\">Website Design Services<\/a>,\u00a0<a href=\"https:\/\/southjerseytechies.net\/server-support\/\">Server Support<\/a>,\u00a0<a href=\"https:\/\/southjerseytechies.net\/server-support\/\">IT Consulting<\/a>,\u00a0<a href=\"https:\/\/www.southjerseytechies.net\/voip-phone-systems\/\">VoIP Phones<\/a>,\u00a0<a href=\"https:\/\/www.southjerseytechies.net\/cloud-services\/\">Cloud Solutions Provider\u00a0<\/a>and much more.\u00a0<a href=\"https:\/\/www.southjerseytechies.net\/about\/contact-us\/\">Contact Us<\/a>\u00a0Today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Avoid Phishing Scams with Three Simple Tips Phishing scams are online messages designed to look like they\u2019re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to &hellip;<\/p>\n<p><a href=\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\">Continue Reading<span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":219,"featured_media":14609,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":true,"jetpack_social_options":{"image_generator_settings":{"template":"highway","default_image_id":0,"font":"","enabled":false},"version":2},"_links_to":"","_links_to_target":""},"categories":[142,103],"tags":[2476,2477,2474,2479,2478],"class_list":["post-14613","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","category-tips-info","tag-cyber-security-awareness-month","tag-cybersecurityawarenessmonth","tag-it-security","tag-recognize-phishing","tag-report-phishing"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cyber Security Awareness Month | Week 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cyber Security Awareness Month | Week 2\" \/>\n<meta property=\"og:description\" content=\"Avoid Phishing Scams with Three Simple Tips Phishing scams are online messages designed to look like they\u2019re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to &hellip;Continue Reading&rarr;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\" \/>\n<meta property=\"og:site_name\" content=\"South Jersey Techies\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/sjtechies\" \/>\n<meta property=\"article:published_time\" content=\"2024-10-07T13:16:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-10-07T13:30:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Website Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:site\" content=\"@sjtechies\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Website Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\"},\"author\":{\"name\":\"Website Admin\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\"},\"headline\":\"Cyber Security Awareness Month | Week 2\",\"datePublished\":\"2024-10-07T13:16:08+00:00\",\"dateModified\":\"2024-10-07T13:30:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\"},\"wordCount\":292,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg\",\"keywords\":[\"Cyber Security Awareness Month\",\"CybersecurityAwarenessMonth\",\"IT Security\",\"Recognize Phishing\",\"Report Phishing\"],\"articleSection\":[\"Security\",\"Tips &amp; Info\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\",\"name\":\"Cyber Security Awareness Month | Week 2\",\"isPartOf\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg\",\"datePublished\":\"2024-10-07T13:16:08+00:00\",\"dateModified\":\"2024-10-07T13:30:06+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg\",\"width\":400,\"height\":225},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/southjerseytechies.net\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber Security Awareness Month | Week 2\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#website\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"name\":\"South Jersey Techies\",\"description\":\"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP\",\"publisher\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#organization\",\"name\":\"South Jersey Techies, LLC\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"contentUrl\":\"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png\",\"width\":291,\"height\":201,\"caption\":\"South Jersey Techies, LLC\"},\"image\":{\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/sjtechies\",\"https:\/\/x.com\/sjtechies\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f\",\"name\":\"Website Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g\",\"caption\":\"Website Admin\"},\"sameAs\":[\"http:\/\/www.southjerseytechies.net\"],\"url\":\"https:\/\/southjerseytechies.net\/blog\/author\/support\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber Security Awareness Month | Week 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/","og_locale":"en_US","og_type":"article","og_title":"Cyber Security Awareness Month | Week 2","og_description":"Avoid Phishing Scams with Three Simple Tips Phishing scams are online messages designed to look like they\u2019re from a trusted source. We may open what we thought was a safe email, attachment or image only to find ourselves exposed to &hellip;Continue Reading&rarr;","og_url":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/","og_site_name":"South Jersey Techies","article_publisher":"https:\/\/www.facebook.com\/sjtechies","article_published_time":"2024-10-07T13:16:08+00:00","article_modified_time":"2024-10-07T13:30:06+00:00","og_image":[{"width":400,"height":225,"url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","type":"image\/jpeg"}],"author":"Website Admin","twitter_card":"summary_large_image","twitter_creator":"@sjtechies","twitter_site":"@sjtechies","twitter_misc":{"Written by":"Website Admin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#article","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/"},"author":{"name":"Website Admin","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f"},"headline":"Cyber Security Awareness Month | Week 2","datePublished":"2024-10-07T13:16:08+00:00","dateModified":"2024-10-07T13:30:06+00:00","mainEntityOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/"},"wordCount":292,"commentCount":0,"publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","keywords":["Cyber Security Awareness Month","CybersecurityAwarenessMonth","IT Security","Recognize Phishing","Report Phishing"],"articleSection":["Security","Tips &amp; Info"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/","url":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/","name":"Cyber Security Awareness Month | Week 2","isPartOf":{"@id":"https:\/\/southjerseytechies.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage"},"thumbnailUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","datePublished":"2024-10-07T13:16:08+00:00","dateModified":"2024-10-07T13:30:06+00:00","breadcrumb":{"@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#primaryimage","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","width":400,"height":225},{"@type":"BreadcrumbList","@id":"https:\/\/southjerseytechies.net\/blog\/cyber_security_2024_week_2\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/southjerseytechies.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Cyber Security Awareness Month | Week 2"}]},{"@type":"WebSite","@id":"https:\/\/southjerseytechies.net\/blog\/#website","url":"https:\/\/southjerseytechies.net\/blog\/","name":"South Jersey Techies","description":"Managed IT, Cloud Solutions, Web Services, Cabling, Voice over IP","publisher":{"@id":"https:\/\/southjerseytechies.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/southjerseytechies.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/southjerseytechies.net\/blog\/#organization","name":"South Jersey Techies, LLC","url":"https:\/\/southjerseytechies.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","contentUrl":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2017\/05\/sjt-logo-2015-b.png","width":291,"height":201,"caption":"South Jersey Techies, LLC"},"image":{"@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/sjtechies","https:\/\/x.com\/sjtechies"]},{"@type":"Person","@id":"https:\/\/southjerseytechies.net\/blog\/#\/schema\/person\/9fa9f56dfc58eea68b5680f2183c253f","name":"Website Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6dd9824aaa045dbc19ff6a4e9677c621e2cfee681044039917acad70980d36db?s=96&d=mm&r=g","caption":"Website Admin"},"sameAs":["http:\/\/www.southjerseytechies.net"],"url":"https:\/\/southjerseytechies.net\/blog\/author\/support\/"}]}},"jetpack_publicize_connections":[],"jetpack_featured_media_url":"https:\/\/southjerseytechies.net\/blog\/wp-content\/uploads\/2024\/09\/Cyber-security-awareness-month-2024-Vector-banner.jpg","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p8eT50-3NH","_links":{"self":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/14613","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/users\/219"}],"replies":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/comments?post=14613"}],"version-history":[{"count":3,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/14613\/revisions"}],"predecessor-version":[{"id":14616,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/posts\/14613\/revisions\/14616"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media\/14609"}],"wp:attachment":[{"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/media?parent=14613"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/categories?post=14613"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/southjerseytechies.net\/blog\/wp-json\/wp\/v2\/tags?post=14613"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}