{"id":7101,"date":"2017-01-26T03:00:46","date_gmt":"2017-01-26T08:00:46","guid":{"rendered":"https:\/\/www.m2sys.com\/blog\/?p=7101"},"modified":"2025-07-31T07:47:45","modified_gmt":"2025-07-31T11:47:45","slug":"biometrics-boom-improves-mobile-device-security","status":"publish","type":"post","link":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/","title":{"rendered":"What the Biometrics Boom Means for Mobile Device Security"},"content":{"rendered":"<figure id=\"attachment_7103\" aria-describedby=\"caption-attachment-7103\" style=\"width: 300px\" class=\"wp-caption alignleft\"><img loading=\"lazy\" decoding=\"async\" class=\"wp-image-7103 size-medium\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/right-patient-pexels-photo-296127-Medium-300x199.jpeg\" alt=\"biometrics is increasing mobile device security\" width=\"300\" height=\"199\" \/><figcaption id=\"caption-attachment-7103\" class=\"wp-caption-text\">Mobile security is undergoing fundamental changes with the introduction of biometrics on smart devices.<\/figcaption><\/figure>\n<p><em><strong>The following guest post on biometrics for mobile device security was submitted by James Daniels.<\/strong><\/em><\/p>\n<p>The mobile biometrics market is booming. The global biometrics system market is projected grow at a compound annual growth rate of <a href=\"https:\/\/www.marketsandmarkets.com\/PressReleases\/biometric-technologies.asp\">16.79 percent between 2016 and 2022<\/a>, expanding from $10.74 billion to $32.73 billion. Demand fueling this growth will be led by the financial sector, the healthcare industry, government initiatives and law enforcement. Fingerprint recognition is currently the most popular biometric technology, finding its most widespread application in the travel and immigration sector, but other technologies such as facial and voice recognition are expected increasingly gain currency as well. Here\u2019s a closer look at the biometrics boom and what it means for your mobile device security and lifestyle.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>The Rise of Mobile Biometrics<\/strong><\/span><\/p>\n<p>Mobile biometrics has been on the market since 2007, when Toshiba introduced fingerprint scanning for the G500 and G900. It hit the mainstream in 2013, when Apple introduced <a href=\"https:\/\/www.igadgetsworld.com\/fingerprint-scanner-history-evolution-but-do-we-really-need-that\/\">Touch ID for the 5s<\/a>. Since then, fingerprint recognition has become standard issue for security on mobile phones. Today\u2019s leading contemporary smartphones like the Apple iPhone 7 include fingerprint recognition and increasingly support other biometrics identification methods.<\/p>\n<p>Biometrics identification now encompasses a growing array of methods, including fingerprint recognition, vein recognition, hand and finger geometry readers, handwriting recognition, iris scanning, voiceprint reading, electrocardiogram recognition and DNA scanning. While these methods vary, they all follow a common pattern. First, a sensor is used to input the user\u2019s identifying information. Next, a computer analyzes the information and translates it into a code or graph for storage. This stored information is then compared with the identifying information of users attempting to log in to authenticate or reject them.<\/p>\n<p>Fingerprint recognition is the <a href=\"https:\/\/searchmobilecomputing.techtarget.com\/feature\/Whats-next-for-mobile-biometrics\">most popular form of biometric identification<\/a>, and will remain so for the foreseeable future, Juniper Research anticipates. But voice recognition and iris scanning are also becoming important, and the future will see new forms of biometric identification. Researchers are currently trying to develop biometrics systems based on electroencephalogram reading.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>Why Biometrics Is Booming<\/strong><\/span><\/p>\n<p>Security needs are driving demand for biometric identification systems. Following the 9\/11 terrorist attacks, Congress mandated the use of biometrics in U.S. visas, setting the stage for travel and immigration to become today\u2019s biggest application area for biometrics. The threat of identity theft has also led the financial and healthcare industries to adopt biometrics as an authentication method. For instance, financial institutions are adopting biometrics as an authentication tool for transactions in order to prevent identity theft and fraud. Similarly, hospitals are adopting biometrics as a safeguard to prevent unauthorized access when nurses log into computer systems to access patient records.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>How Biometrics Secures Your Mobile Device<\/strong><\/span><\/p>\n<p>In the consumer sector, biometrics is being used to prevent identity theft and fraud by securing mobile devices from unauthorized access. As hacking software has grown more sophisticated, passwords have become outdated as a sole means of securing devices. Security experts now recommend that passwords should be supplemented by other means of securing devices, such as a PIN number, an approach known as two-factor or multi-factor authentication. Biometrics are one way to implement multi-factor authentication.<\/p>\n<p>Using biometrics for multi-factor authentication has appeal as well as some drawbacks. Features such as fingerprints and iris patterns are unique and impossible to guess, unlike passwords. However, just like passwords, biometrics cannot be relied upon as a sole means of authentication. For one thing, biometrics records can be stolen and duplicated, exhibited when hackers stole <a href=\"https:\/\/www.wired.com\/2015\/09\/opm-now-admits-5-6m-feds-fingerprints-stolen-hackers\/\">over five million federal employee fingerprint records<\/a> from the Office of Personnel Management. Mythbusters has demonstrated that fingerprint record scanners can be fooled by duplicated fingerprint images. Fingerprint recognition can also be thwarted by hand injuries or changes due to conditions such as arthritis. So biometrics can be used to strengthen passwords, but should not be relied upon as single-factor authentication method.<\/p>\n<p><span style=\"text-decoration: underline;\"><strong>How Biometrics Will Affect Everyday Life<img loading=\"lazy\" decoding=\"async\" class=\"alignright size-medium wp-image-7104\" src=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/rightpatient-thumbs-up-gesture-772977__340-300x200.jpg\" alt=\"mobile biometrics increase smart device security\" width=\"300\" height=\"200\" srcset=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/rightpatient-thumbs-up-gesture-772977__340-300x200.jpg 300w, https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/rightpatient-thumbs-up-gesture-772977__340.jpg 510w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/strong><\/span><\/p>\n<p>Because biometrics will become increasingly important as a second authentication method, guarding biometrics records will become as important as guarding passwords and PIN numbers. Hackers will target biometrics records databases for identity theft, and consumers and businesses will need to take steps to secure such records in order to maintain the effectiveness of biometrics identification.<\/p>\n<p>Consumers and companies will also need to become educated in best practices for using biometrics, along with the limitations of the technology. For instance, a smudge can thwart a fingerprint recognition scanner. And because biometrics is not intended as a single-factor authentication tools, users will need to be trained not to rely exclusively on fingerprint recognition to secure their devices.<\/p>\n<p><em><strong>James Daniels is a freelance writer, business enthusiast, a bit of a tech buff, and an overall geek. He is also an avid reader, who can while away hours reading and knowing about the latest gadgets and tech, whilst offering views and opinions on these topics. jdwrites93@gmail.com<\/strong><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The following guest post on biometrics for mobile device security was submitted by James Daniels. The mobile biometrics market is<\/p>\n","protected":false},"author":398,"featured_media":15304,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_yoast_wpseo_focuskw":"mobile device security","_yoast_wpseo_title":"","_yoast_wpseo_metadesc":"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.","_lmt_disableupdate":"no","_lmt_disable":"no","twitterCardType":"","cardImageID":0,"cardImage":"","cardTitle":"","cardDesc":"","cardImageAlt":"","cardPlayer":"","cardPlayerWidth":0,"cardPlayerHeight":0,"cardPlayerStream":"","cardPlayerCodec":"","footnotes":""},"categories":[90],"tags":[39,291,6,196,77,663],"class_list":["post-7101","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-guest-blog-posts","tag-biometric","tag-biometric-identification","tag-biometrics","tag-guest-post","tag-mobile-biometrics","tag-mobile-device-security"],"acf":{"_how_to_content":"","_faq_content":"","_structured_meta_data":"","_tl_dr_content":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.6.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services<\/title>\n<meta name=\"description\" content=\"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services\" \/>\n<meta property=\"og:description\" content=\"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Digital Transformation of Government Services\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/m2sys\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-26T08:00:46+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-07-31T11:47:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/right-patient-pexels-photo-296127-Medium-768x509-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"534\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Guest\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@m2sys\" \/>\n<meta name=\"twitter:site\" content=\"@m2sys\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Guest\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\"},\"author\":{\"name\":\"Guest\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7\"},\"headline\":\"What the Biometrics Boom Means for Mobile Device Security\",\"datePublished\":\"2017-01-26T08:00:46+00:00\",\"dateModified\":\"2025-07-31T11:47:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\"},\"wordCount\":834,\"commentCount\":1,\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"keywords\":[\"biometric\",\"biometric identification\",\"biometrics\",\"guest post\",\"mobile biometrics\",\"mobile device security\"],\"articleSection\":[\"Guest Blog Posts\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\",\"name\":\"What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services\",\"isPartOf\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\"},\"datePublished\":\"2017-01-26T08:00:46+00:00\",\"dateModified\":\"2025-07-31T11:47:45+00:00\",\"description\":\"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"What the Biometrics Boom Means for Mobile Device Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#website\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"name\":\"Digital Transformation of Government Services\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#organization\",\"name\":\"Digital Transformation of Government Services\",\"url\":\"https:\/\/www.m2sys.com\/blog\/\",\"sameAs\":[\"https:\/\/instagram.com\/m2sys\",\"https:\/\/www.linkedin.com\/company\/m2sys-technology\",\"https:\/\/www.pinterest.com\/m2sys\/\",\"https:\/\/www.youtube.com\/user\/M2SYS\",\"https:\/\/www.facebook.com\/m2sys\",\"https:\/\/twitter.com\/m2sys\"],\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"contentUrl\":\"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png\",\"width\":287,\"height\":48,\"caption\":\"Digital Transformation of Government Services\"},\"image\":{\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7\",\"name\":\"Guest\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g\",\"caption\":\"Guest\"},\"url\":\"https:\/\/www.m2sys.com\/blog\/author\/guest\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services","description":"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/","og_locale":"en_US","og_type":"article","og_title":"What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services","og_description":"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.","og_url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/","og_site_name":"Digital Transformation of Government Services","article_publisher":"https:\/\/www.facebook.com\/m2sys","article_published_time":"2017-01-26T08:00:46+00:00","article_modified_time":"2025-07-31T11:47:45+00:00","og_image":[{"width":800,"height":534,"url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/01\/right-patient-pexels-photo-296127-Medium-768x509-1.jpg","type":"image\/jpeg"}],"author":"Guest","twitter_card":"summary_large_image","twitter_creator":"@m2sys","twitter_site":"@m2sys","twitter_misc":{"Written by":"Guest","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#article","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/"},"author":{"name":"Guest","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7"},"headline":"What the Biometrics Boom Means for Mobile Device Security","datePublished":"2017-01-26T08:00:46+00:00","dateModified":"2025-07-31T11:47:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/"},"wordCount":834,"commentCount":1,"publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"keywords":["biometric","biometric identification","biometrics","guest post","mobile biometrics","mobile device security"],"articleSection":["Guest Blog Posts"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/","url":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/","name":"What the Biometrics Boom Means for Mobile Device Security - Digital Transformation of Government Services","isPartOf":{"@id":"https:\/\/www.m2sys.com\/blog\/#website"},"datePublished":"2017-01-26T08:00:46+00:00","dateModified":"2025-07-31T11:47:45+00:00","description":"Mobile device security is fundamentally improving with the introduction of biometric identification on smart devices. Learn more in this guest post.","breadcrumb":{"@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.m2sys.com\/blog\/guest-blog-posts\/biometrics-boom-improves-mobile-device-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"What the Biometrics Boom Means for Mobile Device Security"}]},{"@type":"WebSite","@id":"https:\/\/www.m2sys.com\/blog\/#website","url":"https:\/\/www.m2sys.com\/blog\/","name":"Digital Transformation of Government Services","description":"","publisher":{"@id":"https:\/\/www.m2sys.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.m2sys.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.m2sys.com\/blog\/#organization","name":"Digital Transformation of Government Services","url":"https:\/\/www.m2sys.com\/blog\/","sameAs":["https:\/\/instagram.com\/m2sys","https:\/\/www.linkedin.com\/company\/m2sys-technology","https:\/\/www.pinterest.com\/m2sys\/","https:\/\/www.youtube.com\/user\/M2SYS","https:\/\/www.facebook.com\/m2sys","https:\/\/twitter.com\/m2sys"],"logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","contentUrl":"https:\/\/www.m2sys.com\/blog\/wp-content\/uploads\/2017\/12\/m2sys-blog.png","width":287,"height":48,"caption":"Digital Transformation of Government Services"},"image":{"@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/48f09faa10cac85eb0a8d8bb984a80f7","name":"Guest","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.m2sys.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d201879437f2ccf21b1bd715f3d90d0f?s=96&d=mm&r=g","caption":"Guest"},"url":"https:\/\/www.m2sys.com\/blog\/author\/guest\/"}]}},"modified_by":"Shakib Khan","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7101"}],"collection":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/users\/398"}],"replies":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/comments?post=7101"}],"version-history":[{"count":11,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7101\/revisions"}],"predecessor-version":[{"id":22297,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/posts\/7101\/revisions\/22297"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media\/15304"}],"wp:attachment":[{"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/media?parent=7101"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/categories?post=7101"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.m2sys.com\/blog\/wp-json\/wp\/v2\/tags?post=7101"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}