{"id":3517,"date":"2015-10-14T10:25:13","date_gmt":"2015-10-14T10:25:13","guid":{"rendered":"http:\/\/www.abrahamsconsulting.com\/blog\/?p=3517"},"modified":"2015-10-19T23:43:05","modified_gmt":"2015-10-19T23:43:05","slug":"healthcare-data-storage-4-flaws-to-avoid","status":"publish","type":"post","link":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/","title":{"rendered":"Healthcare Data Storage: 4 flaws to avoid"},"content":{"rendered":"<p>Of course all <a href=\"http:\/\/bit.ly\/1KSoDWJ\">data<\/a> is important, but healthcare data storage?\u00a0\u00a0\u00a0 {<a href=\"http:\/\/bit.ly\/1jQQe1b\">See our solutions showcase here<\/a><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright size-medium wp-image-3554\" src=\"http:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125-300x300.jpg\" alt=\"Healthcare Data Storage\" width=\"300\" height=\"300\" srcset=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125-300x300.jpg 300w, https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125-150x150.jpg 150w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/>}<\/p>\n<p>Well,<\/p>\n<p>It&#8217;s supreme.<\/p>\n<p>Do you agree?<\/p>\n<p>Your health status plus additional potent data about you?<\/p>\n<p>Sounds supreme to me.<\/p>\n<p>Here are eight (8) reminders why healthcare data storage reigns supreme:<\/p>\n<p>Medical records contain:<\/p>\n<ol>\n<li>Social Security numbers<\/li>\n<li>Birth dates<\/li>\n<li>Addresses<\/li>\n<li>Phone numbers<\/li>\n<li>Passport numbers<\/li>\n<li>Employment status<\/li>\n<li>Financial account information<\/li>\n<li>Health status<\/li>\n<\/ol>\n<p>So how did you handle the news reported by the <a href=\"http:\/\/bit.ly\/1G1wLVP\">Associated Press on September 24, 2015<\/a> \u00a0that, MIDAS, the central electronic storehouse for information collected under President Obama&#8217;s health care law was &#8216;flawed?,<\/p>\n<p><em>&#8216;Flawed?&#8217;<\/em><\/p>\n<p>&#8216;<em>Flawed<\/em>&#8216;,\u00a0is\u00a0a weak word to describe a healthcare data storage system that is sanctioned by the government to protect your most valuable asset.<\/p>\n<p>&#8212;your data.<\/p>\n<p>This electronic storehouse does not handle medical records, the writer clarified.<\/p>\n<p>But, it does include all the other Personal Identifiable Information (PII) that are listed above.<\/p>\n<p>So, the hacker would score\u00a07\u00a0out of 8 chances to get all the information he would need to \u00a0wreck your life.<\/p>\n<p>How is that for a little consolation?\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <a href=\"mailto:agibson@abrahamsconsulting.com\"><em>{contact us for your Data Storage consultation today}<\/em><\/a><\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/p91P2d65NAU\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<h6>Healthcare Data Storage cannot afford the\u00a0negligence that was\u00a0discovered by an independent audit of the\u00a0Multidimensional Insurance Data Analytics System (MIDAS):<\/h6>\n<p><span class=\"bullet_square\"><span class=\"web_specialcharacters\">\u25a0<\/span><\/span>\u00a0Using a shared read-only account for access to the database that contained individuals\u2019 personal information. Shared account creates serious vulnerability because if data is stolen, it\u2019s much more difficult to tell who was looking at what information, and when.<\/p>\n<p><span class=\"bullet_square\"><span class=\"web_specialcharacters\">\u25a0<\/span><\/span>\u00a0Failure to disable \u2018\u2018generic accounts\u2019\u2019 used for maintenance or other special access during testing, an oversight that can foster complacency about security practices when a system becomes operational.<\/p>\n<p><span class=\"bullet_square\"><span class=\"web_specialcharacters\">\u25a0<\/span><\/span>\u00a0Failure to conduct certain automated vulnerability scans that mimic known cyberattacks and could reveal weaknesses in MIDAS and the systems supporting it.<\/p>\n<p><span class=\"bullet_square\"><span class=\"web_specialcharacters\">\u25a0<\/span><\/span>\u00a0Database weaknesses. A total of 135 such vulnerabilities \u2014 oftentimes software bugs\u2014 were discovered by the inspector general\u2019s vulnerability scans. Of these, 22 were classified as high risk, meaning they could have potentially severe or catastrophic fallout, and 62 as medium risk.<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/0GKALA_4Q6s\" width=\"560\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><\/p>\n<p>By the way, did you know that the MIDAS system cost $110 million and stores up 10 million customer records?<\/p>\n<p>It is likely that your information is stored in this system.<\/p>\n<p>But enough of the scare tactics.<\/p>\n<h5>Five (5) areas to consider for your healthcare data storage strategy<\/h5>\n<ul>\n<li>How are you currently protecting your data? Files\/Apps\/Email\/VMs<\/li>\n<li>How much data are you protecting<\/li>\n<li>What are you backing your data up to? Disk\/Tape\/Cloud\/Combination<\/li>\n<li>What is your current Disaster Recovery strategy? Replicating Onsite\/Offsite\/Appliances<\/li>\n<li>What is your archiving strategy? How much data do you need to archive?<\/li>\n<li>Are there any data governance policies in place for your date? Retention\/E-discovery\/Compliance<\/li>\n<\/ul>\n<p><em>Are you ready to have a comprehensive discussion about your data storage needs? Contact us <a href=\"mailto:agibson@abrahamsconsulting.com\">here<\/a>?<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Of course all data is important, but healthcare data storage?\u00a0\u00a0\u00a0 {See our solutions showcase here} Well, It&#8217;s supreme. Do you agree? Your health status plus additional potent data about you? Sounds supreme to me. Here are eight (8) reminders why healthcare data storage reigns supreme: Medical records contain: Social Security numbers Birth dates Addresses Phone [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":3554,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[14,165,1137],"tags":[166],"class_list":["post-3517","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud","category-data-storage-security","category-software","tag-healthcare-data"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Healthcare Data Storage: 4 flaws to avoid - TechTonic Times<\/title>\n<meta name=\"description\" content=\"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Healthcare Data Storage: 4 flaws to avoid - TechTonic Times\" \/>\n<meta property=\"og:description\" content=\"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"TechTonic Times\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-14T10:25:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-10-19T23:43:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"640\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Angela Gibson\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Angela Gibson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\"},\"author\":{\"name\":\"Angela Gibson\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"headline\":\"Healthcare Data Storage: 4 flaws to avoid\",\"datePublished\":\"2015-10-14T10:25:13+00:00\",\"dateModified\":\"2015-10-19T23:43:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\"},\"wordCount\":470,\"commentCount\":0,\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg\",\"keywords\":[\"healthcare data\"],\"articleSection\":[\"Cloud\",\"Data Storage Security\",\"Software\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\",\"name\":\"Healthcare Data Storage: 4 flaws to avoid - TechTonic Times\",\"isPartOf\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg\",\"datePublished\":\"2015-10-14T10:25:13+00:00\",\"dateModified\":\"2015-10-19T23:43:05+00:00\",\"author\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\"},\"description\":\"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg\",\"contentUrl\":\"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg\",\"width\":2828,\"height\":2828,\"caption\":\"Healthcare Data Storage\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Healthcare Data Storage: 4 flaws to avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#website\",\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/\",\"name\":\"TechTonic Times\",\"description\":\"Security I Networking I Storage I IT Staffing I Managed Services\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad\",\"name\":\"Angela Gibson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g\",\"caption\":\"Angela Gibson\"},\"url\":\"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Healthcare Data Storage: 4 flaws to avoid - TechTonic Times","description":"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/","og_locale":"en_US","og_type":"article","og_title":"Healthcare Data Storage: 4 flaws to avoid - TechTonic Times","og_description":"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.","og_url":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/","og_site_name":"TechTonic Times","article_published_time":"2015-10-14T10:25:13+00:00","article_modified_time":"2015-10-19T23:43:05+00:00","og_image":[{"url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg","width":640,"height":640,"type":"image\/jpeg"}],"author":"Angela Gibson","twitter_misc":{"Written by":"Angela Gibson","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#article","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/"},"author":{"name":"Angela Gibson","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"headline":"Healthcare Data Storage: 4 flaws to avoid","datePublished":"2015-10-14T10:25:13+00:00","dateModified":"2015-10-19T23:43:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/"},"wordCount":470,"commentCount":0,"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg","keywords":["healthcare data"],"articleSection":["Cloud","Data Storage Security","Software"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/","url":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/","name":"Healthcare Data Storage: 4 flaws to avoid - TechTonic Times","isPartOf":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage"},"image":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg","datePublished":"2015-10-14T10:25:13+00:00","dateModified":"2015-10-19T23:43:05+00:00","author":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad"},"description":"Healthcare data storage security is critical. It contains PII information is a goldmine for thieves. Healthcare Data Storage is supreme. It demands specific and deliberate efforts for protection.","breadcrumb":{"@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#primaryimage","url":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg","contentUrl":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-content\/uploads\/2015\/10\/dreamstime_xl_33014125.jpg","width":2828,"height":2828,"caption":"Healthcare Data Storage"},{"@type":"BreadcrumbList","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/healthcare-data-storage-4-flaws-to-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.abrahamsconsulting.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Healthcare Data Storage: 4 flaws to avoid"}]},{"@type":"WebSite","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#website","url":"https:\/\/www.abrahamsconsulting.com\/blog\/","name":"TechTonic Times","description":"Security I Networking I Storage I IT Staffing I Managed Services","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.abrahamsconsulting.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.abrahamsconsulting.com\/blog\/#\/schema\/person\/2af41230f21d0cfc614be7ffd1cbcdad","name":"Angela Gibson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c54bf3cfef1d2416a64501386c44cf093ab7044f0c0830ffd697ffb5d92636a2?s=96&d=mm&r=g","caption":"Angela Gibson"},"url":"https:\/\/www.abrahamsconsulting.com\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3517","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/comments?post=3517"}],"version-history":[{"count":0,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/posts\/3517\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media\/3554"}],"wp:attachment":[{"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/media?parent=3517"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/categories?post=3517"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.abrahamsconsulting.com\/blog\/wp-json\/wp\/v2\/tags?post=3517"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}