{"id":14440,"date":"2021-02-15T05:54:45","date_gmt":"2021-02-15T10:54:45","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=14440"},"modified":"2021-07-18T03:00:14","modified_gmt":"2021-07-18T07:00:14","slug":"4-ways-to-ensure-data-protection-and-compliance","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/","title":{"rendered":"4 Ways to Ensure Data Protection and Compliance"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Nowadays, companies are storing large amounts of data. At the same time, consumers are becoming more and more aware of privacy issues and are starting to hold companies accountable when it comes to data protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Companies are required to adhere to certain laws and regulations regarding the handling of sensitive data, and if they fail to do so they can lose their customers\u2019 trust and suffer reputational damage, but they can also be subject to hefty fines and face legal consequences.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s why it\u2019s essential to make data protection and compliance your top priority. Here are some tips to help you achieve that.&nbsp;<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Data classification<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Most of the enterprise data is unstructured. In fact, <\/span><span style=\"font-weight: 400;\">unstructured data makes up more than 80% of all enterprise data<\/span><span style=\"font-weight: 400;\">, and this number will only continue to grow throughout the years. This data includes anything from emails, phone recordings, and text messages, to data from social media.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, some of these records may contain private data that needs to be protected and without a good classification system, you risk leaving sensitive data insufficiently secured and exposed to cybersecurity threats.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s essential to know exactly which data you\u2019re collecting, where it\u2019s located, how sensitive it is. and then classify it into different categories.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Not all data is created equal, so some categories of data will be more sensitive than others and require different levels of protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Having a good classification system will allow you to focus on the most sensitive categories without wasting your time and resources on safeguarding data that doesn\u2019t need any special protection.<\/span><\/p>\n<figure id=\"attachment_14442\" aria-describedby=\"caption-attachment-14442\" style=\"width: 800px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.cloudapper.com\/hipaa-ready-compliance-software\/\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-14442 size-full\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/hipaa-ready-hipaa-compliance-software.jpg\" alt=\"hipaa-ready-hipaa-compliance-software\" width=\"800\" height=\"445\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/hipaa-ready-hipaa-compliance-software.jpg 800w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/hipaa-ready-hipaa-compliance-software-600x334.jpg 600w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/hipaa-ready-hipaa-compliance-software-768x427.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><figcaption id=\"caption-attachment-14442\" class=\"wp-caption-text\">HIPAA Ready &#8211; HIPAA Compliance Management Application. <a href=\"https:\/\/www.cloudapper.com\/hipaa-ready-compliance-software\/\">Try For Free!<\/a><\/figcaption><\/figure>\n<h2><span style=\"font-weight: 400;\">Retention policy<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">For highly-sensitive data, there are different laws that determine how long you should retain it.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">These requirements depend on different factors such as your industry, the size of your company, and the state from which you operate.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It is essential to double-check all the requirements when creating an <\/span><a href=\"https:\/\/jatheon.com\/blog\/email-retention-policy-best-practices\/\"><span style=\"font-weight: 400;\">email retention policy<\/span><\/a><span style=\"font-weight: 400;\">. You might even be subject to overlapping laws calling for different retention periods, in which case it\u2019s best to go for the longest one across the board in order to eliminate confusion.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A great way to ensure proper policy implementation is to look for <\/span><a href=\"https:\/\/jatheon.com\/products\/on-premise-email-archiving-solutions\/\"><span style=\"font-weight: 400;\">email archiving solutions<\/span><\/a><span style=\"font-weight: 400;\"> that allow you to automate retention. Keeping track of retention periods and manually archiving email can leave room for mistakes and compromise compliance, but automation can help you minimize these risks and become more efficient.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Encryption<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">No matter how careful you are, accidents can still happen and you can experience a security breach. However, if you use encryption technology, you can prevent those security breaches from becoming data breaches.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to <\/span><span style=\"font-weight: 400;\">the Ponemon Institute\u2019s 2020 Global Encryption Trends Study<\/span><span style=\"font-weight: 400;\"> more and more businesses have begun implementing a consistent encryption strategy in the past 15 years. The study also shows that one of the main drivers for using encryption technology is to protect sensitive customer data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This comes as no surprise as data breaches can lead to serious reputational damage, lead to the loss of trust, and have a negative financial impact on companies who fail to protect their data.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Ponemon Institute\u2019s Data Breach Impact study<\/span><span style=\"font-weight: 400;\"> found that 65% of customers who were victims of a data breach lost trust in the organization and that organizations lost up to $3.94 million in revenue after the breach. Moreover, once a breach is disclosed, stock prices tend to drop by 5% on average.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Encryption can dramatically reduce the risk of experiencing data breaches. It can help you meet legislation requirements and minimize the possibility of financial penalties while also protecting your customer&#8217;s rights and safeguarding their private data.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Employee education<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">While hacker attacks are a legitimate threat to your data, most data breaches happen because of human error.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means that your employees are one of your biggest weaknesses and that you should focus on educating them about common security threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the growing number of cyber threats, most businesses now fear that their cybersecurity will become compromised at some point. With that in mind, companies are starting to become more aware of the fact that human error poses a serious data cybersecurity threat. In fact, even <\/span><span style=\"font-weight: 400;\">52% of businesses admit that employees are their biggest weakness<\/span><span style=\"font-weight: 400;\"> when it comes to data protection.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, <\/span><span style=\"font-weight: 400;\">the Mimecast\u2019s State of Email Security Report<\/span><span style=\"font-weight: 400;\"> shows that only 1 in 5 companies offer monthly awareness training to their employees.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keeping your employees informed and educated about the latest cybersecurity threats and risks is one of your best lines of defense against human error.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Although you can\u2019t completely eliminate it, you can reduce these risks significantly by providing regular training, scenario-based exercises, and real-life examples to get your employees more vigilant and prepared to recognize and avoid these threats.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When it comes to <a href=\"https:\/\/www.cloudapper.com\/hipaa-ready-compliance-software\/\">data protection and compliance<\/a>, there\u2019s not much room for mistakes. Failing to meet strict laws and regulations can easily lead to financial fees and legal penalties, and losing the trust of your customers can be equally expensive. Follow these tips to ensure regulatory compliance, keep your data protected, and your customers happy.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Nowadays, companies are storing large amounts of data. At the same time, consumers are becoming more and more aware of<\/p>\n","protected":false},"author":398,"featured_media":15391,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[67],"tags":[],"class_list":["post-14440","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-hardware"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Nowadays, companies are storing large amounts of data. At the same time, consumers are becoming more and more aware of\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-15T10:54:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-07-18T07:00:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/4-Ways-to-Ensure-Data-Protection-and-Compliance-800x445-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\"},\"headline\":\"4 Ways to Ensure Data Protection and Compliance\",\"datePublished\":\"2021-02-15T10:54:45+00:00\",\"dateModified\":\"2021-07-18T07:00:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\"},\"wordCount\":867,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\",\"name\":\"4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2021-02-15T10:54:45+00:00\",\"dateModified\":\"2021-07-18T07:00:14+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"4 Ways to Ensure Data Protection and Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/","og_locale":"en_US","og_type":"article","og_title":"4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services","og_description":"Nowadays, companies are storing large amounts of data. At the same time, consumers are becoming more and more aware of","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2021-02-15T10:54:45+00:00","article_modified_time":"2021-07-18T07:00:14+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/02\/4-Ways-to-Ensure-Data-Protection-and-Compliance-800x445-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c"},"headline":"4 Ways to Ensure Data Protection and Compliance","datePublished":"2021-02-15T10:54:45+00:00","dateModified":"2021-07-18T07:00:14+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/"},"wordCount":867,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/","name":"4 Ways to Ensure Data Protection and Compliance - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2021-02-15T10:54:45+00:00","dateModified":"2021-07-18T07:00:14+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/4-ways-to-ensure-data-protection-and-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"4 Ways to Ensure Data Protection and Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ccd2044dbd488486c30d37d437d0320c","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Robert Brown","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14440"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=14440"}],"version-history":[{"count":2,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14440\/revisions"}],"predecessor-version":[{"id":15392,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/14440\/revisions\/15392"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15391"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=14440"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=14440"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=14440"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}