{"id":122,"date":"2020-05-07T22:00:54","date_gmt":"2020-05-07T16:30:54","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=122"},"modified":"2020-05-07T22:01:48","modified_gmt":"2020-05-07T16:31:48","slug":"cybersecurity-in-the-days-of-covid-19-more-important-than-ever","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/","title":{"rendered":"Cybersecurity In The Days Of COVID-19, More Important Than Ever"},"content":{"rendered":"\n<p>As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise, the risk of <a href=\"https:\/\/en.wikipedia.org\/wiki\/Cybersecurity_information_technology_list\">cybersecurity<\/a> attacks taking advantage of our increased reliance on digital tools and the uncertainty of crisis caused by forced confinement in our homes.<\/p>\n\n\n\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655dd0aa3c655\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655dd0aa3c655\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#We_Have_Increased_Our_Dependence_On_Technology\" title=\"We Have Increased Our Dependence On Technology\">We Have Increased Our Dependence On Technology<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#Threats_That_Exploit_Fear_And_Uncertainty\" title=\"Threats That Exploit Fear And Uncertainty\">Threats That Exploit Fear And Uncertainty<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#Cybersecurity_Recklessness_Soars\" title=\"Cybersecurity Recklessness Soars\">Cybersecurity Recklessness Soars<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#Awareness_And_Caution_The_Best_Safety_Tips\" title=\"Awareness And Caution, The Best Safety Tips\">Awareness And Caution, The Best Safety Tips<\/a><\/li><\/ul><\/nav><\/div>\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"We_Have_Increased_Our_Dependence_On_Technology\"><\/span>We Have Increased Our Dependence On Technology<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>The reported cases of coronavirus in the world cover more than 150 countries and the obligation of confinement lead individuals and companies to have a greater dependence on communications by digital means. The Internet has become almost the only channel for interaction and as a means of work.<br>\nWe have increased our dependence on technology, companies, both in the private and public sectors, continue their work to encourage teleworking, and communications between people are practically reduced to calls and videoconferences, chats, and messages on social networks. Similarly, a good part of the services and information offered by different government organizations are accessible by online means.<br>\nIn this context, as novel as it is unusual, an attack by cybercriminals that would limit users and companies from accessing their devices, their data, or simply the Internet, would be devastating because it would lead to a stoppage of operations.<br>\nAnd putting ourselves in the worst-case scenario, such an attack could cause infrastructure failures that can affect even cities, paralyzing, for example, the function of health care systems or public services in general.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Threats_That_Exploit_Fear_And_Uncertainty\"><\/span>Threats That Exploit Fear And Uncertainty<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>Cybercriminals seek human recklessness to enter systems. When a crisis is prolonged excessively, as it is currently happening, people often make mistakes that they would not have made under normal circumstances.<br>\nIt is estimated that 98% of attacks are due to the use of social engineering methods, and the creativity of cyber criminals increases day by day to access passwords and personal or special interest data. To do this, current topics are used to tempt users and make them make mistakes when clicking on a link or opening an attached message in an email.<br>\nWe have lived the cases of phishing and malware distribution impersonating the Chinese Ministry of Health or the impersonation campaign to the World Health Organization (WHO) in which a donation was requested to be made in the form of Bitcoins, to contribute to the investigation of a cure against COVID-19.<br>\nThe extortion cases even affect hospitals, with the record of an attack on a hospital in the Czech Republic, as well as messages addressed to elderly people with threats of contagion if a certain amount of money is not transferred.<br>\nAnd scams via the web proliferate over the purchase of virus test kits, fraudulent pages aimed at collecting donations for research into a vaccine, or portals that offer and sell all kinds of products in the Darknet markets.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Cybersecurity_Recklessness_Soars\"><\/span>Cybersecurity Recklessness Soars<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<p>On the other hand, it is not a conscious thing, but being online for more time leads us to behave in a more risky way. For example, it is not uncommon to search for free access to undesirable web pages or to search for software without official licensing, thus opening a door to possible attacks and the installation of malware.<br>\nLet&#8217;s not forget that there can also be hidden risks in the usual tasks related to credit cards or in the installation of specialized applications.<br>\nNormally it is dangerous to click on unreliable links, but during the pandemic, this action can be destructive and have a very high economic cost for whoever performs it or for the organization in which they work.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><span class=\"ez-toc-section\" id=\"Awareness_And_Caution_The_Best_Safety_Tips\"><\/span>Awareness And Caution, The Best Safety Tips<span class=\"ez-toc-section-end\"><\/span><\/h2>\n\n\n\n<ul><li>COVID-19 has forced us to change our daily habits and routines, but it also requires a change in our online behavior:<\/li><li>In the current situation, wherein many cases employee-owned domestic devices are used to    remotely access company networks, it is particularly relevant that our homes are cybersecurity.<\/li><li>You have to be especially careful to whom we give your personal information. It is convenient    to take our time to check what we are reading, what they ask us, and where we are going to    access it.<\/li><li>Last but not least, the best way to act is to look at everything with a magnifying glass and    trust only those companies, people, or institutions with credible creditworthiness, as well as    national or local government agencies.<\/li><li>To help protect everyone, the Basque Cybersecurity Center has created a specific section on the related risks and threats related to the coronavirus and an awareness kit with tips, specific infographics, and a series of documents that help prevent exposure to cyber threats.<\/li><\/ul>\n\n\n<p><strong>Also Read: <a href=\"https:\/\/www.trendstechblog.com\/how-to-accelerate-your-business-with-artificial-intelligence\/\"><span style=\"font-size: inherit;\">How To Accelerate Your Business With Artificial Intelligence<\/span><\/a><\/strong><\/p>\n<div class=\"cm-post-meta\">\u00a0<\/div>","protected":false},"excerpt":{"rendered":"<p>As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on&#8230;<\/p>\n","protected":false},"author":1,"featured_media":123,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[99,97,96,98],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Cybersecurity In The Days Of COVID-19, More Important Than Ever<\/title>\n<meta name=\"description\" content=\"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity In The Days Of COVID-19, More Important Than Ever\" \/>\n<meta property=\"og:description\" content=\"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-07T16:30:54+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-05-07T16:31:48+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/05\/Cybersecurity-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Cybersecurity In The Days Of COVID-19, More Important Than Ever\",\"datePublished\":\"2020-05-07T16:30:54+00:00\",\"dateModified\":\"2020-05-07T16:31:48+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\"},\"wordCount\":777,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Application Security\",\"Computer Security\",\"Cybersecurity\",\"Web Security\"],\"articleSection\":[\"TECHNOLOGY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\",\"url\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\",\"name\":\"Cybersecurity In The Days Of COVID-19, More Important Than Ever\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-05-07T16:30:54+00:00\",\"dateModified\":\"2020-05-07T16:31:48+00:00\",\"description\":\"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"TECHNOLOGY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/technology\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity In The Days Of COVID-19, More Important Than Ever\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity In The Days Of COVID-19, More Important Than Ever","description":"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/","og_locale":"en_US","og_type":"article","og_title":"Cybersecurity In The Days Of COVID-19, More Important Than Ever","og_description":"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise","og_url":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-05-07T16:30:54+00:00","article_modified_time":"2020-05-07T16:31:48+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/05\/Cybersecurity-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Cybersecurity In The Days Of COVID-19, More Important Than Ever","datePublished":"2020-05-07T16:30:54+00:00","dateModified":"2020-05-07T16:31:48+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/"},"wordCount":777,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Application Security","Computer Security","Cybersecurity","Web Security"],"articleSection":["TECHNOLOGY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/","url":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/","name":"Cybersecurity In The Days Of COVID-19, More Important Than Ever","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-05-07T16:30:54+00:00","dateModified":"2020-05-07T16:31:48+00:00","description":"As the coronavirus pandemic continues to test global health, economic, political and social systems, there is another invisible threat on the rise","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/cybersecurity-in-the-days-of-covid-19-more-important-than-ever\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"TECHNOLOGY","item":"https:\/\/www.trendstechblog.com\/category\/technology\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity In The Days Of COVID-19, More Important Than Ever"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/122"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=122"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/122\/revisions"}],"predecessor-version":[{"id":124,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/122\/revisions\/124"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/123"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=122"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=122"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=122"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}