{"id":21776,"date":"2025-01-31T02:29:21","date_gmt":"2025-01-31T07:29:21","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=21776"},"modified":"2025-01-31T02:29:21","modified_gmt":"2025-01-31T07:29:21","slug":"biometric-identification-protecting-from-rampant-social-media-scams","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/","title":{"rendered":"Biometric Identification Protecting From Rampant Social Media Scams"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Most people live two lives. There\u2019s everyday life, with work, school and family, and digital life on websites, social media, forums and platforms. Like it or not, they are entwined. If someone\u2019s digital identity is stolen, it has a profound impact in the real world.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">This means that protecting online data is as critical, if not more, than protecting physical security. Social media activity, information shared and data uploaded, including photos, videos and comments, need protection. Medical data is also at the top of the list. Compromised information includes more than sensitive details about someone\u2019s health. It can also include Social Security numbers, financial records, physical addresses and much more.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that many technology providers offer robust security measures. They can protect people against social media scams, fraud and identity theft. It goes beyond using secure, strong passwords. Two-factor authentication and biometric identification are examples of this advanced security in action. Biometrics, in particular, can help cut down on fraud and social media scams.<\/span><\/p>\n<h2><b>Using Biometric Identification to Verify and Protect Identity<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Passwords are not enough for modern and digital security. Setting a strong password requires lengthy phrases that are difficult to remember. Password management tools help, but their existence proves that passwords are not as effective as they should be.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Many people can\u2019t even recall them half the time. Despite being told not to, many individuals reuse passwords. They&#8217;re also shared and simplified to the point that nefarious actors can readily access accounts.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A verified, authentic and reliable method is necessary to protect access to online accounts and profiles and legitimize data. Especially when meeting new patients, health care professionals need a trustworthy method for substantiating a contact\u2019s identity. That\u2019s where biometric authentication comes into the picture. It\u2019s no wonder security proponents have called for a unique patient identifier to <\/span><a href=\"https:\/\/www.rightpatient.com\/blog\/why-should-senate-choose-biometrics-as-unique-patient-identifier\/\"><span style=\"font-weight: 400;\">ensure people are identified accurately<\/span><\/a><span style=\"font-weight: 400;\"> and matched with the correct records.\u00a0<\/span><\/p>\n<h2><b>How Biometric Identification Can Reduce Social Media Scams, Fraud and Theft<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Biometrics is the science of measuring or analyzing a person\u2019s unique characteristics and traits specific to them. They can be physical but also behavioral. In the case of digital technologies, biometrics often involve scanning body features to verify identity. This includes scanning fingerprints to gain access to an app or area of a property.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It might also involve scans of the retina or another personally identifiable body part to authenticate identity. Other identifiers include facial features or shape, hand geometry, blood vessel patterns discerned through the skin and DNA.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">How and why does this reduce nefarious activities?<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Biometrics cannot be stolen, at least not easily. That significantly reduces unauthorized attempts at data access.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">In the medical sector, biometrics follow HIPAA regulations. They also make it easier to verify an individual\u2019s true identity.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Biometric authentication can be logged and monitored using data without giving away sensitive information. That makes audits and security monitoring possible and effective.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Most biometrics technologies are accurate, reliable and help streamline verification workflows. People can get in and out faster and easier.<\/span><\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s a verifiable way to prove identity. No one else has the same eye color, face shape or fingerprints.<\/span><\/p>\n<h2><b>Aiding Patient-Doctor Verifications on Both Sides<\/b><\/h2>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Medical professionals can use biometrics to nearly instantly verify a patient or contact\u2019s identity before divulging sensitive information. It\u2019s a stop-gap, albeit fairly nonrestrictive, for preventing accidental data dumps or unauthorized access. That also extends to digital systems. Nefarious actors would be unable to leverage digital platforms and solutions without the right authentication.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Social media scammers commonly create a fake profile or page disguised as a medical entity and then share compromised links \u2014 which lead to malicious websites \u2014 to steal personal information. Incorporating a layer of biometric authentication across all valid medical portals helps identify malicious websites. The authentication would act as a preventive measure for the uninformed. Patients who know they\u2019re supposed to encounter a biometric scan but don\u2019t are likely working with a bad actor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Sometimes,<\/span><a href=\"https:\/\/www.machiassavings.bank\/security-center\/social-media-identity-theft-scams\/\"> <span style=\"font-weight: 400;\">people even overshare information<\/span><\/a><span style=\"font-weight: 400;\"> that can personally identify or digitally compromise them. This can happen in more ways than one, including social engineering. People can unwittingly provide personal details via impromptu calls, surveys, games or support chats, which bad actors can collect and use. All they need to do is provide personal information gathered from social media and online profiles with company phone reps or online support to access accounts. Medical professionals, untrained to spot the tells, can also fall victim to these scams, tricked into thinking they\u2019re talking to the real patient.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Fake ads and product endorsements are tougher to spot, although there are red flags. Agents may rush people into placing orders or promise their product can cure several diseases. However, people not being <\/span><a href=\"https:\/\/www.rightpatient.com\/guest-blog-posts\/the-influence-of-biometrics-on-medical-data-security\/\"><span style=\"font-weight: 400;\">properly vetted through authentication measures<\/span><\/a><span style=\"font-weight: 400;\"> should realize they\u2019re probably not talking to legitimate health care or medical professionals.<\/span><\/p>\n<h2><b>Biometrics: A Unique Identifier<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Personal health data needs to be stored and handled safely, which means limiting access to this information to authorized individuals. Reliable methods are necessary to verify identity. It can be used to end misidentification and help health care providers verify who is who. That same technology can apply to all forms of verification, including social media and online accounts. It will also act as a flag or reminder for patients that when no authorization is requested, they may be dealing with unscrupulous individuals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Imagine how much theft and fraud would be eliminated by requiring a personal biometrics identifier and blocking access to would-be thieves. It could be a game-changer for everyone\u2019s digital lives.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most people live two lives. There\u2019s everyday life, with work, school and family, and digital life on websites, social media,<\/p>\n","protected":false},"author":383,"featured_media":21778,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"","_lmt_disableupdate":"","_lmt_disable":"","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[67],"tags":[],"class_list":["post-21776","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-biometric-hardware"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Most people live two lives. There\u2019s everyday life, with work, school and family, and digital life on websites, social media,\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2025-01-31T07:29:21+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2025\/01\/Biometric-Identification-Protecting-from-Rampant-Social-Media-Scams.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1344\" \/>\n\t<meta property=\"og:image:height\" content=\"896\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Matthew Bennett\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Matthew Bennett\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\"},\"author\":{\"name\":\"Matthew Bennett\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc\"},\"headline\":\"Biometric Identification Protecting From Rampant Social Media Scams\",\"datePublished\":\"2025-01-31T07:29:21+00:00\",\"dateModified\":\"2025-01-31T07:29:21+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\"},\"wordCount\":944,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"articleSection\":[\"Biometric Hardware\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\",\"name\":\"Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2025-01-31T07:29:21+00:00\",\"dateModified\":\"2025-01-31T07:29:21+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometric Identification Protecting From Rampant Social Media Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc\",\"name\":\"Matthew Bennett\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg\",\"caption\":\"Matthew Bennett\"},\"description\":\"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.\",\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/shaon\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/","og_locale":"en_US","og_type":"article","og_title":"Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services","og_description":"Most people live two lives. There\u2019s everyday life, with work, school and family, and digital life on websites, social media,","og_url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2025-01-31T07:29:21+00:00","og_image":[{"width":1344,"height":896,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2025\/01\/Biometric-Identification-Protecting-from-Rampant-Social-Media-Scams.jpeg","type":"image\/jpeg"}],"author":"Matthew Bennett","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Matthew Bennett","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/"},"author":{"name":"Matthew Bennett","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc"},"headline":"Biometric Identification Protecting From Rampant Social Media Scams","datePublished":"2025-01-31T07:29:21+00:00","dateModified":"2025-01-31T07:29:21+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/"},"wordCount":944,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"articleSection":["Biometric Hardware"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/","url":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/","name":"Biometric Identification Protecting From Rampant Social Media Scams - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2025-01-31T07:29:21+00:00","dateModified":"2025-01-31T07:29:21+00:00","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/biometric-identification-protecting-from-rampant-social-media-scams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometric Identification Protecting From Rampant Social Media Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/f1c48fb3ffdafc7681adda819de983dc","name":"Matthew Bennett","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2023\/06\/34AD2-96x96.jpg","caption":"Matthew Bennett"},"description":"The author leads the digital marketing team at M2SYS Technology and an occasional blogger. He is passionate about writing various government and enterprise biometric identity management technology adoption related topics and the changes it brings on the general people\u2019s lives.","url":"https:\/\/www.m2sys.com\/blog\/author\/shaon\/"}]}},"modified_by":"Matthew Bennett","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/21776"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/383"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=21776"}],"version-history":[{"count":1,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/21776\/revisions"}],"predecessor-version":[{"id":21779,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/21776\/revisions\/21779"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/21778"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=21776"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=21776"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=21776"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}