{"id":3562,"date":"2014-09-27T08:00:04","date_gmt":"2014-09-27T12:00:04","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=3562"},"modified":"2025-04-23T08:00:15","modified_gmt":"2025-04-23T12:00:15","slug":"biometrics-reduce-risk-security-breaches","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/","title":{"rendered":"Biometrics: How does it Reduce the Risk of Security Breaches?"},"content":{"rendered":"<p><em><strong>The following is a guest post by Robert Kramers.<\/strong><\/em><\/p>\n<p>In one way or another, biometrics has been around for a long time. Film fans may remember it from the 1993 film Demolition Man. This film is often cited as \u201cpredicting\u201d the use of biometrics in security, but the truth is that this idea has been floating around since the discovery of fingerprints.<\/p>\n<p>So, what is bio-security?<\/p>\n<p>Bio-security uses biometrics as a way of identification and access control. It involves the use of body parts as an identification process, and works in a similar way we know fingerprint scanning works. An eye scanner, for instance, can detect all of the minute differences in the human eye, which are much more visible than people think, as evidenced by the photo below.<\/p>\n<p style=\"text-align: center;\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/eye.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-3563 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/eye-600x334.jpg\" alt=\"iris recognition biometric identification management\" width=\"300\" height=\"265\" \/><\/a><\/p>\n<p>When it comes to biometric security, everything from your <a title=\"face to your DNA can be used to identify you\" href=\"https:\/\/en.wikipedia.org\/wiki\/Biometrics\" target=\"_blank\" rel=\"noopener noreferrer\">face to your DNA can be used to identify you<\/a>. This technology is not just the stuff of science fiction anymore and biometric security and is currently used on consumer tablets and smartphones as well as access to sensitive information and hardware within high level corporations.<\/p>\n<p>Biometrics has the potential to be used everywhere, from top-end businesses keeping entire buildings secure to artists, writers and photographers looking to secure the safety and protection of their intellectual property. Biosecurity is far more advanced than any other form of security, and contains fewer holes and breaches that leave more traditional systems vulnerable.<\/p>\n<h2>Fast Access to Personal Information<\/h2>\n<p>The main advantage of biometric technology over traditional security systems is that it detects things that are unique to the individual quickly and accurately.<\/p>\n<p>This means that a place of business can ensure that only the employees gain access and <strong>attempted crime can be pinpointed faste<\/strong>r.<\/p>\n<p>Biometrics and a number of advancing technologies, including wireless power through resonant induction, have the ability to work cohesively. Items like <a title=\"this biometric sensor\" href=\"https:\/\/www.engadget.com\/2013\/03\/11\/biometric-sensor-printed-directly-on-skin\/\" target=\"_blank\" rel=\"noopener noreferrer\">this biometric sensor<\/a>, which is printed directly on to human flesh (aka the biostamp) means, that a number of personally identifiable features has the ability to be obtained from the likes of a patient, in just seconds. Wireless power would provide the ability for the biostamp to communicate with internal devices like LVADs. This has the potential to help with medical information security, monitoring and identification.<\/p>\n<h2>Accuracy of Identification<\/h2>\n<p>Despite the misconception provided by popular sci-fi action movies, in real life modern biometric scanners detect capillary flow behind the eye or the finger, which means that they can only be used by a living, breathing person.<\/p>\n<p>Biometrics can also be used to stop security holes that other systems can not detect.<\/p>\n<p>For example, at Disney World, where a 5-day ticket can cost up to US$350, biometric <a title=\"fingerprint scanners\" href=\"https:\/\/www.m2sys.com\/blog\/biometric-hardware\/m2-fuseid-smart-biometric-finger-scanner-training-video\/\" target=\"_blank\" rel=\"noopener noreferrer\">fingerprint scanners<\/a> are used to ensure that only the person who purchased a ticket can enter the park, which <strong>stops people from lending, sharing or even selling their ticket to others<\/strong>.<\/p>\n<figure id=\"attachment_3564\" aria-describedby=\"caption-attachment-3564\" style=\"width: 300px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/fingerprinting.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-3564 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/fingerprinting-600x334.jpg\" alt=\"fingerprint biometrics for identification, finger scanner\" width=\"300\" height=\"225\" \/><\/a><figcaption id=\"caption-attachment-3564\" class=\"wp-caption-text\">Biometrics in use<\/figcaption><\/figure>\n<h2>Absence of Anonymity<\/h2>\n<p>Every time an eye scanner, fingerprint scanner or any other form of biometric is used to allow access for one person, that person\u2019s details can be stored in a database. Not only is their physiological data stored which can be used to find their name, address and more but also information on when and where they logged in.<\/p>\n<p>By scanning for fingerprints, irises and <a href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/need-know-dental-biometrics\/\" target=\"_blank\" rel=\"noopener noreferrer\">other unique parts<\/a> of an individual\u2019s physiology, it ensures that it knows exactly who is trying to gain access at any given time.<\/p>\n<p>This information can be used across the board, from employers who simply want to make sure their employees are logging in and doing their work when they should, to those investigating crimes on the premises.<\/p>\n<h2>Unauthorized Duplication<\/h2>\n<p>We live in an age where everything from luxury handbags to prescription medication can be copied to the finest details, and this also applies to keys and key cards, the very things that keep us secure using current security standards. The beauty of biometrics is the near impossibility of duplication.<\/p>\n<p>As each individual is unique, and due to the complex nature of the biometric systems, moulds and other inanimate things cease to work.<\/p>\n<h2>Loss and Theft<\/h2>\n<p>Finally, whereas keys and codes can be lost, biometrics can not.<\/p>\n<p>Simply put, you can\u2019t lose you.<\/p>\n<p>Not only does this mean that you will always have access, but it also guarantees that you are not leaving open access to your property on the subway or in the back of a taxi. Where your access is, you are also &#8211; which adds another layer of complexity and security to accessed gained.<\/p>\n<p>In conclusion, the idea of biometrics and security have an increasing number reasons to be adopted particularly for reasons related to security. Additionally, it is very possible that some forms of biometric security <a title=\"like vein pattern recognition\" href=\"https:\/\/www.gizmag.com\/vein-pattern-recognition-snowflake\/8920\/\" target=\"_blank\" rel=\"noopener noreferrer\">like vein pattern recognition<\/a>\u00a0and eye scanning will have the ability to provide hygiene benefits due to non-contact biometric interpretation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following is a guest post by Robert Kramers. In one way or another, biometrics has been around for a<\/p>\n","protected":false},"author":398,"featured_media":3563,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"biometrics","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[39,6,492,196,491],"class_list":["post-3562","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric","tag-biometrics","tag-biometrics-to-eliminate-security-breaches","tag-guest-post","tag-robert-kramers"],"acf":{"_how_to_content":null,"_faq_content":null,"_structured_meta_data":null,"_tl_dr_content":null},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2014-09-27T12:00:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-23T12:00:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/eye.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"445\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\"},\"headline\":\"Biometrics: How does it Reduce the Risk of Security Breaches?\",\"datePublished\":\"2014-09-27T12:00:04+00:00\",\"dateModified\":\"2025-04-23T12:00:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\"},\"wordCount\":826,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"biometrics\",\"biometrics to eliminate security breaches\",\"guest post\",\"Robert Kramers\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\",\"name\":\"Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2014-09-27T12:00:04+00:00\",\"dateModified\":\"2025-04-23T12:00:15+00:00\",\"description\":\"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Biometrics: How does it Reduce the Risk of Security Breaches?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services","description":"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services","og_description":"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2014-09-27T12:00:04+00:00","article_modified_time":"2025-04-23T12:00:15+00:00","og_image":[{"width":800,"height":445,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2014\/09\/eye.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b"},"headline":"Biometrics: How does it Reduce the Risk of Security Breaches?","datePublished":"2014-09-27T12:00:04+00:00","dateModified":"2025-04-23T12:00:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/"},"wordCount":826,"commentCount":2,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","biometrics","biometrics to eliminate security breaches","guest post","Robert Kramers"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/","name":"Biometrics: How does it Reduce the Risk of Security Breaches? - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2014-09-27T12:00:04+00:00","dateModified":"2025-04-23T12:00:15+00:00","description":"The use of biometrics to reduce or eliminate security breaches is proliferating as more people learn and understand the benefits of the technology.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-reduce-risk-security-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Biometrics: How does it Reduce the Risk of Security Breaches?"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/e02d8a1c4c877b378ceb4ea34e6da20b","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Abu Baker Siddique","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3562"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=3562"}],"version-history":[{"count":14,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3562\/revisions"}],"predecessor-version":[{"id":21917,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/3562\/revisions\/21917"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/3563"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=3562"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=3562"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=3562"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}