{"id":2666,"date":"2014-12-08T02:00:00","date_gmt":"2014-12-08T02:00:00","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=2666"},"modified":"2014-12-08T17:08:01","modified_gmt":"2014-12-08T17:08:01","slug":"new-data-security-law-just-plain-bull","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/","title":{"rendered":"The new data security law: Just plain bull"},"content":{"rendered":"<p><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\"><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter size-full wp-image-2902\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\" alt=\"New Datat Security Law\" width=\"800\" height=\"533\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg 800w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224-300x199.jpg 300w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>The new <a href=\"http:\/\/www.whitehouse.gov\/the-press-office\/2014\/10\/17\/executive-order-improving-security-consumer-financial-transactions\">data security law<\/a>,\u00a0 if not plain bull, is certainly a fight amongst bulls.<\/p>\n<p>Who is in the ring?<\/p>\n<p>The Federal government versus the state government. The banking groups versus the retailers.<\/p>\n<p>And let&#8217;s not forget the ring master&#8212;the bully&#8212;the master of ceremonies in this circus.<\/p>\n<p>Do you believe that the new data security law will protect your data?<\/p>\n<p>These are desperate times for data security. Desperate people are vulnerable.<\/p>\n<p>You should appreciate President Obama&#8217;s effort. His executive order for data security makes us feel good.<\/p>\n<p>And, it <em>is<\/em> good to have gotten his attention. I especially like the sound of &#8216;<em>executive<\/em>.&#8217;<\/p>\n<p>Just don&#8217;t succumb to the <a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/heck-hindsight-data-security-demands-foresight\/\">bull<\/a>.<\/p>\n<p><iframe src=\"http:\/\/www.washingtonpost.com\/posttv\/c\/embed\/02b5958e-561a-11e4-b86d-184ac281388d\" width=\"480\" height=\"290\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>Bullies don&#8217;t obey law.<\/p>\n<p><em>Historically.<\/em><\/p>\n<h5><a href=\"http:\/\/www.washingtonpost.com\/blogs\/wonkblog\/wp\/2014\/02\/24\/heres-why-the-government-wants-a-national-data-breach-law\/\">So why would the new data security law be the exception?<\/a><\/h5>\n<p>But then again, he is not trying to convert the bully. The hackers. Those damn thieves.<\/p>\n<p>He is trying to contain the bulls.<\/p>\n<p>Will he succeed?<\/p>\n<p><iframe src=\"\/\/www.youtube.com\/embed\/rUXah31k-I0\" width=\"420\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>It&#8217;s showtime!<\/p>\n<p>On November 12, 2014, financial industry groups told congressional leaders that robust oversight will help U.S. retailers protect consumers from cyberattacks&#8211;<a href=\"http:\/\/www.bna.com\/banking-groups-urge-n17179911897\/\">Bloomberg BNA<\/a><\/p>\n<p>The financial industry group further contends that:<\/p>\n<blockquote><p><em>\u201cIt is only when coupled with the development of strong internal data protection standards and robust oversight that the retail community will find itself in a better position to protect consumers and their confidential personal financial information from criminal abuse,\u201d wrote the American Bankers Association, the Consumer Bankers Association, The Clearing House, the Credit Union National Association, the Financial Services Roundtable, the Independent Community Bankers of America and the National Association of Federal Credit Unions.<\/em><\/p><\/blockquote>\n<p>So the financial services industry has clearly identified the speck of dust in the retailers eye.<\/p>\n<p>Do you smell the self-righteousness?<\/p>\n<p>But the retailers argue that\u00a0 financial institutions should be\u00a0 required to provide the <strong><em>&#8216;same detailed notice to their customers as is required of other businesses under law.&#8217;<\/em><\/strong><\/p>\n<p>And, that despite a <a href=\"http:\/\/www.theatlantic.com\/business\/archive\/2014\/10\/why-the-jp-morgan-data-breach-is-like-no-other\/381098\/\">major<\/a> data security breach recently reported by JPMorgan Chase &amp; Co.,\u00a0 a detailed notice has not been given to customers.<\/p>\n<p>And by the way,<\/p>\n<p>It is not only JPMorgan Chase&#8217;s data that has been breached.\u00a0 <a href=\"http:\/\/blog.aarp.org\/2014\/08\/28\/data-breach-hits-major-banks\/\">Several other banks<\/a>\u00a0 have suffered similar breaches.<\/p>\n<p>Apparently, the financial industry thinks that they should be exempt.<\/p>\n<p>Exempt from providing you and I with a detailed notice when our personal information have been pilfered on their watch.<\/p>\n<p>A case of\u00a0 the special child syndrome?<\/p>\n<p>According to them, the <a href=\"http:\/\/www.business.ftc.gov\/documents\/bus53-brief-financial-privacy-requirements-gramm-leach-bliley-act\">Gramm-Leach Bliley Act <\/a>(GLB Act), is all the data security law they need.<\/p>\n<p>It&#8217;s on!<\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/www.abrahamsconsulting.com\/security\/\">Concerned about data security? Contact us here. <\/a><\/p>\n<p>While the bulls continue to lock horns over minutiae, the bully is licking his chops. His teeth dripping with the blood from our carcass&#8211;our data.<\/p>\n<p>My data and yours.<\/p>\n<p>So will the president&#8217;s new data security law succeed?<\/p>\n<p><a href=\"http:\/\/www.examiner.com\/article\/obama-announces-buysecure-initiative-urges-passage-of-national-data-breach-bill\">It has <\/a><em><a href=\"http:\/\/www.examiner.com\/article\/obama-announces-buysecure-initiative-urges-passage-of-national-data-breach-bill\">potential<\/a>.<\/em><\/p>\n<p>So it <strong><em>could<\/em><\/strong> succeed.<\/p>\n<p>If,<\/p>\n<p>And,<\/p>\n<p><em> Only i<\/em>f,<\/p>\n<p>The bulls fight the bully instead of each other.<\/p>\n<p style=\"text-align: left;\">\u00a0<em>Further reading:<\/em><\/p>\n<p style=\"text-align: left;\"><a href=\"http:\/\/www.bankrate.com\/finance\/banking\/us-data-breaches-7.aspx\">1<em>1 data breaches that stung US Consumers<\/em><\/a><\/p>\n<p style=\"text-align: left;\"><em><a href=\"http:\/\/www.theatlantic.com\/business\/archive\/2014\/10\/why-the-jp-morgan-data-breach-is-like-no-other\/381098\/\">Why the JP Morgan Data Breach Is Like No Other <\/a><\/em><\/p>\n<p style=\"text-align: left;\"><em><a href=\"http:\/\/www.abrahamsconsulting.com\/blog\/security-breach\/\">Data Security Breach? Go Ahead, Infect Me<\/a><\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The new data security law,\u00a0 if not plain bull, is certainly a fight amongst bulls. Who is in the ring? The Federal government versus the state government. The banking groups versus the retailers. And let&#8217;s not forget the ring master&#8212;the bully&#8212;the master of ceremonies in this circus. Do you believe that the new data security [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":2902,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1138,3],"tags":[142,140,141],"class_list":["post-2666","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-ciphertrust","category-data-security","tag-data-security-breach","tag-data-security-law","tag-gramm-leach-bliley-act"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The new data security law: Just plain bull - TechTonic Times<\/title>\n<meta name=\"description\" content=\"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The new data security law: Just plain bull - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2014-12-08T02:00:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2014-12-08T17:08:01+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"The new data security law: Just plain bull\",\"datePublished\":\"2014-12-08T02:00:00+00:00\",\"dateModified\":\"2014-12-08T17:08:01+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\"},\"wordCount\":512,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\",\"keywords\":[\"data security breach\",\"data security law\",\"Gramm-Leach Bliley Act\"],\"articleSection\":[\"CipherTrust\",\"Data Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\",\"name\":\"The new data security law: Just plain bull - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\",\"datePublished\":\"2014-12-08T02:00:00+00:00\",\"dateModified\":\"2014-12-08T17:08:01+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg\",\"width\":800,\"height\":533,\"caption\":\"New Datat Security Law\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The new data security law: Just plain bull\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The new data security law: Just plain bull - TechTonic Times","description":"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/","og_locale":"en_US","og_type":"article","og_title":"The new data security law: Just plain bull - TechTonic Times","og_description":"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/","og_site_name":"TechTonic Times","article_published_time":"2014-12-08T02:00:00+00:00","article_modified_time":"2014-12-08T17:08:01+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg","type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"The new data security law: Just plain bull","datePublished":"2014-12-08T02:00:00+00:00","dateModified":"2014-12-08T17:08:01+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/"},"wordCount":512,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg","keywords":["data security breach","data security law","Gramm-Leach Bliley Act"],"articleSection":["CipherTrust","Data Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/","name":"The new data security law: Just plain bull - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg","datePublished":"2014-12-08T02:00:00+00:00","dateModified":"2014-12-08T17:08:01+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"The new data security law is a fight contain the bulls--The financial institutions versus the retailers. The federal government vs the state government.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2014\/12\/dreamstime_s_26522224.jpg","width":800,"height":533,"caption":"New Datat Security Law"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/new-data-security-law-just-plain-bull\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"The new data security law: Just plain bull"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/2666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=2666"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/2666\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/2902"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=2666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=2666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=2666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}