{"id":15071,"date":"2021-06-18T06:59:49","date_gmt":"2021-06-18T10:59:49","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=15071"},"modified":"2024-05-23T08:54:50","modified_gmt":"2024-05-23T12:54:50","slug":"facility-management-tips","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/","title":{"rendered":"Facility Management Tips"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A functional facilities management system won&#8217;t allow for company assets to be breached by vandals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">For organizations, security is one of the topmost priorities. To avoid property loss or possible damage, it&#8217;s critical that you establish a security strategy using key technologies and the best practices available.<\/span><\/p>\n<p><b>What kind of threat can my facility face?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Before you even start thinking of protecting your facility, you need to understand what kind of security risks are there.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Your organization, just like every other one out there, has got objectives for its security arrangements. Experts on security for facilities advise that you consult with executives to identify what you need specifically from the security system. When this is done, the priorities of the organization will change.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">See examples of common risks according to the type of facility:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Colleges and universities: <\/b><span style=\"font-weight: 400;\">Loss of intellectual properties via fire outbreak or intentional attack is a serious risk faced by educational facilities. Some of these resources have been developed via private, government, or industrial funding. Losing them directly affects the facility, and closes the door against other opportunities and investments in the future.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Clinics and other healthcare institutions: <\/b><span style=\"font-weight: 400;\">Medical equipment, patients, and the records of patients are vital resources hospitals need to protect. Keep in mind that different healthcare facilities provide different services. Based on that, the level of risk is not the same.\u00a0 For instance, mental health facilities require a high level of security.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Government buildings: <\/b><span style=\"font-weight: 400;\">Activities with the intent of inflicting injuries or causing fatalities is a serious risk to government facilities.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">When it comes to facility management,<\/span> <span style=\"font-weight: 400;\">failure of security is quite obvious should it happen. Security experts agree that often no matter how uncommon, companies do recognize the perks of an efficient security strategy.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Some essential questions are to be answered before establishing a security plan:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What assets does the company own?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What risks are related to your facility?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">What are the consequences of the identified risks?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Some risks are acceptable. Others are not. Getting information from the questions above will help you decide on what risks need to be controlled and which are to be allowed. After that, a risk control strategy has to be developed and implemented.<\/span><\/p>\n<p><b>Starting a security plan<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Different assets, policies, people, and technology have to be assembled by facility executives and managers in a strategic manner to build a security plan that works.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Even security experts agree that well-trained staff should be part of a successful security plan.<\/span><\/p>\n<p><b>What are the technologies you need?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">In addition to trained personnel and well-defined security goals, you need technology. There are two primary aspects of technology for facility security:<\/span><\/p>\n<ol>\n<li><b><\/b> <b>Access control alarm monitoring system (ACAM): <\/b><span style=\"font-weight: 400;\">As the name implies, this tech gives limited access to some parts of a building or the entire building via management and monitoring. The technology is user-interfaced to send signals of unauthorized movement or other issues. It&#8217;s compatible with every type of security tech.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Experts say this building block is usually a starting point for companies as it allows for the application of the primary security principles: deter, detect, delay, and deny.<\/span><\/p>\n<ol start=\"2\">\n<li><b><\/b> <b>Video surveillance system (VSS): <\/b><span style=\"font-weight: 400;\">Using a network of cameras, locations are monitored in real-time. Specific events can also be recorded. This is useful as evidence or for investigation.<\/span><\/li>\n<\/ol>\n<p><b>Who are the people you need?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">The installed technology won&#8217;t operate on its own. People have to be in a position to implement the security plan using the technologies. So you need:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Executives for decision making and implementation of the established strategy<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">IT professionals<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">\u00a0<\/span><span style=\"font-weight: 400;\">Facilities managers<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Current security staff<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Another recommendation is that you get a security consultant that&#8217;s qualified and experienced to carry out the risk assessment of your facility, supervise the creation of the security strategy, and facilitate security workshops.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Following the facility type and the strategies crafted for execution, you may need an architect and engineer to perform certain tasks.<\/span><\/p>\n<p><b>How do you achieve a functional security plan?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Have a meeting with your security team and find out the goals the integrated access control and surveillance is not meeting. This will reveal areas where more mitigation is required. You can get useful suggestions from security consultants.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When the entire plan is in progress, your security system manufacturers will test and maintain the lot following best practices.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to experts, the entire strategy for security should operate cyclically from analysis, development of mitigation strategies, selection of mitigation strategies, implementation, operation, back to analysis.<\/span><\/p>\n<p><b>What is modern-day tech for security?<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Access control and video surveillance have been very useful for years with advancements in features and efficacy. An innovative approach to this system has been a shift to the cloud.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Starting from the use of modern and highly secure <\/span><span style=\"font-weight: 400;\">electric <\/span><span style=\"font-weight: 400;\">g<\/span><span style=\"font-weight: 400;\">ates<\/span><span style=\"font-weight: 400;\"> at the premisses entryway, some other technologies have been invented to resolve exclusive security problems including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Drones: <\/b><span style=\"font-weight: 400;\">This remote-controlled security system has many different uses. Vehicle manufacturers, very large agricultural works, and organizations having more than one facility and occupying a large expanse of land will turn to drones as a security gadget. Soon, it&#8217;ll be common to find drone security in power plants, oil and gas plants, dams, solar farms, rail yards, etc<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Experts also say that drones may replace manual labor used in the inspection of solar panels to ensure proper functioning.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Drones also function maximally in a corporate environment and government facilities. As for college campuses, there are some privacy and regulatory problems that need resolution with time.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Gunshot detection:<\/b><span style=\"font-weight: 400;\"> Experts report that gunshot detection systems are being installed by organizations. Whether or not someone is harmed by a gunshot, the source needs to be identified.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">So this tech utilizes 360\u00b0 sensors, cameras, or microphones to identify a gunshot in an area, calculate where it&#8217;s coming from, and alert those who need to know. A geographical information system (GIS) is sometimes merged with the system to detect the location on a map. University and college campuses are adopting this tech to spot incidents without delay.<\/span><\/p>\n<p><b>Final thoughts<\/b><\/p>\n<p><span style=\"font-weight: 400;\">There&#8217;s so much a company may lose with a failed security system. So the need to develop, implement and maintain a security plan is apt.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With this guide, you can work out a plan for security. But your type of facility and personnel will determine most of the plan.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Talk with a security consultant for the best system to attain your security objective. A software like <a href=\"https:\/\/www.cloudapper.com\/facilities-management-app\/\">CAFM<\/a> &#8211; a facilities management system can aid this process very well.\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A functional facilities management system won&#8217;t allow for company assets to be breached by vandals. For organizations, security is one<\/p>\n","protected":false},"author":398,"featured_media":15072,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[1720],"class_list":["post-15071","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-facility-management-tips"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Facility Management Tips - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Facility Management Tips - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"A functional facilities management system won&#8217;t allow for company assets to be breached by vandals. For organizations, security is one\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2021-06-18T10:59:49+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-23T12:54:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/06\/Facility-Management-Tips.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"950\" \/>\n\t<meta property=\"og:image:height\" content=\"631\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca1191779e5624a60919315dad1aed88\"},\"headline\":\"Facility Management Tips\",\"datePublished\":\"2021-06-18T10:59:49+00:00\",\"dateModified\":\"2024-05-23T12:54:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\"},\"wordCount\":1077,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"Facility Management Tips\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\",\"name\":\"Facility Management Tips - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2021-06-18T10:59:49+00:00\",\"dateModified\":\"2024-05-23T12:54:50+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Facility Management Tips\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca1191779e5624a60919315dad1aed88\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Facility Management Tips - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/","og_locale":"en_US","og_type":"article","og_title":"Facility Management Tips - Digital Transformation of Government Services","og_description":"A functional facilities management system won&#8217;t allow for company assets to be breached by vandals. For organizations, security is one","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2021-06-18T10:59:49+00:00","article_modified_time":"2024-05-23T12:54:50+00:00","og_image":[{"width":950,"height":631,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2021\/06\/Facility-Management-Tips.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca1191779e5624a60919315dad1aed88"},"headline":"Facility Management Tips","datePublished":"2021-06-18T10:59:49+00:00","dateModified":"2024-05-23T12:54:50+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/"},"wordCount":1077,"commentCount":0,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["Facility Management Tips"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/","name":"Facility Management Tips - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2021-06-18T10:59:49+00:00","dateModified":"2024-05-23T12:54:50+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/facility-management-tips\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Facility Management Tips"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/ca1191779e5624a60919315dad1aed88","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/15071"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=15071"}],"version-history":[{"count":4,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/15071\/revisions"}],"predecessor-version":[{"id":21100,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/15071\/revisions\/21100"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15072"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=15071"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=15071"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=15071"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}