{"id":33542,"date":"2019-06-18T18:52:09","date_gmt":"2019-06-18T14:52:09","guid":{"rendered":"https:\/\/www.msp360.com\/resources\/?p=33542"},"modified":"2024-01-03T16:26:32","modified_gmt":"2024-01-03T12:26:32","slug":"how-to-prevent-phishing","status":"publish","type":"post","link":"https:\/\/www.msp360.com\/resources\/blog\/how-to-prevent-phishing\/","title":{"rendered":"Guide on How to Prevent Phishing"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Phishing attacks (in which hackers send fake emails in an effort to trick users into clicking malicious links or giving away private information) have been around for decades. But they are constantly evolving, with new types of phishing attacks (such as spear phishing and <a href=\"https:\/\/www.msp360.com\/resources\/blog\/clone-phishing\/\">clone phishing<\/a>) targeting users.<\/span><!--more--><\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s thus important to ensure that your strategy for combating phishing is constantly evolving, too. This article offers tips on how to prevent phishing. We\u2019ll discuss how to detect phishing emails (or \u201cphishes\u201d), tools to help prevent phishes from reaching your end-users and best practices for educating users with the information they need to avoid falling victim to phishing attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s no way to guarantee complete safety against phishing attacks. But by following the best practices described below, you can help minimize the risk that the end-users you support will fall for the phishes they receive.<\/span><\/p>\n<p>For more information about phishing please refer to our guide on the topic:<\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/anti-phishing\/\" rel=\"bookmark\">Anti-Phishing Guide<\/a><\/p>\n<h2><b>How to Detect Phishing Emails<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Even within phishing emails that look at first glance just like the real emails sent out by legitimate banks, application sites, and other sources, there are often clues that make it easy to identify the emails as phishes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The email asks for personal information, such as birthday information, a phone number, a social security number or mother's maiden name. Real messages should never ask for this kind of data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Misspelled words or bad grammar.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">They tell you you\u2019ve won the lottery or some other contest, usually one you didn\u2019t enter.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The email asks you to make a donation for some heart-wrenching cause, to an organization with a name close to a real one, but slightly different.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The email has a threatening tone or declaration of emergency. Phishes may say that an account has been hacked, that benefits are about to lapse, that you\u2019ve been recorded through your webcam, or that there\u2019s another threat already on your system. They often urge immediate action, in order to give the recipient less time to think.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The email has attachments. (These may appear to be relatively innocuous, like PDFs or Word files, but they may, in fact, be applications that will plant malware.)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">The actual URL is different from the one shown. (A link may be underlined text or an image. Hovering over the link shows the actual URL that clicking on the link will take you to. If this doesn\u2019t match the apparent sender of the message, it\u2019s a prime indicator that the message is fake.)<\/span>\n<p><div id=\"attachment_31329\" style=\"width: 1024px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-31329\" class=\"wp-image-31329 size-full\" style=\"font-size: 1rem;\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-9.png\" alt=\"How to Prevent Phishing. How to Detect Phishing Emails\" width=\"1014\" height=\"906\" srcset=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-9.png 1014w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-9-300x268.png 300w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-9-768x686.png 768w, https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-9-624x558.png 624w\" sizes=\"auto, (max-width: 1014px) 100vw, 1014px\" \/><p id=\"caption-attachment-31329\" class=\"wp-caption-text\">How to detect phishing emails<\/p><\/div><\/li>\n<\/ul>\n<h2><b>How to Prevent Phishing<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Anti-phishing systems scan for discrepancies between the apparent sender and actual sender, links that lead to known malicious sites, and malignant attachments. A good anti-spam system will block many phishes without having to scan the message for malicious content, simply because the apparent sender doesn\u2019t match the actual sender, or because the actual sender is sending the same message to many users at the same time.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">However, user training is still important even with a phishing scanner in place. Hackers are constantly trying to find new ways to get past filters. For example, they will set up new domains every day, and take down domains once the security vendors have identified them as fake. This constant change makes it difficult for security vendors to keep their signature files up to date.<\/span><\/p>\n<p><strong><span style=\"color: #e38934;\">Check out these marketing templates that we created to help MSPs sell Microsoft 365 as a managed service:\u00a0<\/span><\/strong><\/p>\n<div class=\"call-to-action\">\n<div class=\"call-to-action__left\" style=\"width: 40%;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-41595\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2020\/06\/How-to-Sell-Microsoft-365-Backup-Services-4.png\" alt=\"MSP's Marketing Templates for Selling Microsoft 365\" width=\"252\" height=\"212\" \/><\/div>\n<div class=\"call-to-action__right\" style=\"width: 60%;\">\n<div class=\"call-to-action__title\">MSP's Marketing Templates for Selling Microsoft 365<\/div>\n<div class=\"call-to-action__text\">\n<p>Download a set of free white-label templates designed to help MSPs sell Microsoft 365 as a managed service.<\/p>\n<\/div>\n<!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-264020e3-ba89-4e4a-842f-f8cf5f33a295\" data-portal=\"5442029\" data-id=\"264020e3-ba89-4e4a-842f-f8cf5f33a295\"><span class=\"hs-cta-node hs-cta-264020e3-ba89-4e4a-842f-f8cf5f33a295\" id=\"hs-cta-264020e3-ba89-4e4a-842f-f8cf5f33a295\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/264020e3-ba89-4e4a-842f-f8cf5f33a295\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-264020e3-ba89-4e4a-842f-f8cf5f33a295\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/264020e3-ba89-4e4a-842f-f8cf5f33a295.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code -->\n<\/div>\n<\/div>\n<h3><b>Deploying Internet Security Software<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">One important concept in security software is to have multiple layers. An antivirus app on the end user's system is not enough. A corporate firewall is not enough. An email filtering appliance is not enough. Any one of these systems may be bypassed by a new, sophisticated attack. The best approach is to use several layers of security, to keep them updated, and to train users regularly on new types of attacks.<\/span><\/p>\n<h4><b>Anti-Phishing Software <\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-31316 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Anti-phishing-software.png\" alt=\"How to Prevent Phishing. Anti-phishing software\" width=\"168\" height=\"188\" \/>Many firewalls (which may also be called UTMs or unified threat management systems) scan incoming email and look for security threats. The critical step for using a firewall to help combat phishing is to ensure that its anti-phishing functions are enabled and to keep it updated so that new types of phishing threats are covered as soon as the security vendor detects them. <\/span><\/p>\n<h4><b>Spam Filter<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-31317 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-3-6.png\" alt=\"How to Prevent Phishing. Spam filter\" width=\"168\" height=\"188\" \/>Your email system, whether it is hosted by a vendor like Google or runs on an internal email server such as Microsoft Exchange or Linux Sendmail, has the capability to use spam filters that detect many types of email that pose a threat. This includes phishes, as well as emails with viruses and unsolicited commercial emails. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">These filters can also be used as separate appliances in conjunction with a hosted or internal email server. Under this approach, the mail is routed to the anti-spam system first, then on to the email server. Many vendors claim catch rates of 99% or higher for spam, but the more critical measurement is false positives. If users have to check their spam folder regularly for legitimate emails that have been erroneously blocked, they will not only waste a lot of time but will also have the opportunity to open phishing emails that have been blocked for good reason.<\/span><\/p>\n<h4><b>Antivirus Solution<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-31318 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-7.png\" alt=\"How to Prevent Phishing. Antivirus Solution\" width=\"168\" height=\"188\" \/>Install an antivirus solution, schedule signature updates, and monitor the antivirus status on all equipment.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Good antivirus software is necessary. It will not only block phishes but stop other types of malicious content as well.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/top-5-antivirus-solutions-for-managed-service-providers\/\" target=\"_blank\" rel=\"noopener noreferrer\">Top Antivirus Solutions for Managed Service Providers<\/a><\/p>\n<h4><b>Web Filter<\/b><\/h4>\n<p><span class=\"alignnone\" style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-31323 alignright\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-3-7.png\" alt=\"Web Filter\" width=\"168\" height=\"188\" \/>If a user does click on a link in a phish that is intended to take them to a site that will install malware or just make them think they\u2019re logging into a legitimate bank or application web site, the web filter will block them from reaching the site if it has been identified as a malicious site. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">One thing to train users on regarding this topic is that they should trust the web filter. It doesn\u2019t do much good to have the web filter ID a site as malicious if the end user bypasses the filter because they think it\u2019s legitimate.<\/span><\/p>\n<h4><b>Two-Factor Authentication<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-31324 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-2-8.png\" alt=\"How to Prevent Phishing. 2FA\" width=\"168\" height=\"188\" \/>Two-factor authentication, or 2FA, adds a level of verification to user logins. Rather than simply requiring a username and password, 2FA sends a text message or another second factor to which the user must respond correctly before being able to log in. If a hacker has a user\u2019s login username, and even their password, they will still not be able to enter a website because they won\u2019t be able to get the second factor right.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Like all other security solutions, 2FA can be bypassed by clever hackers, so it\u2019s not a set-and-forget function; it is simply another technique to add an additional layer of security.<\/span><\/p>\n<p><span class=\"further-reading \">Further reading<\/span>\u00a0<a href=\"https:\/\/www.msp360.com\/resources\/blog\/two-factor-authentication-solutions\/\" target=\"_blank\" rel=\"noopener noreferrer\">Two-Factor Authentication: Solutions, Methods, Best Practices<\/a><\/p>\n<h4><b>Password Management<\/b><\/h4>\n<p><span style=\"font-weight: 400;\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-31325 size-full\" src=\"https:\/\/www.msp360.com\/resources\/wp-content\/uploads\/2019\/06\/Group-3-8.png\" alt=\"How to Prevent Phishing. Password Management\" width=\"168\" height=\"188\" \/>In addition to having virus protection software on your computer, it is crucial to use a password manager to manage your online credentials.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Rather than having a user type in a password each time they visit a site, a password manager stores the passwords in a secure database. When the user goes to the login page for a given website, the password manager will fill in the username and password. Since the password manager stores the login information for each site separately, a site whose URL is close to that of the correct site, but not an exact match, will not have login information stored. This gives the user another clue that something is wrong.<\/span><\/p>\n<h3><b>Phishing Prevention Best Practices<\/b><\/h3>\n<p id=\"last\"><span style=\"font-weight: 400;\">The single most important anti-phishing practice is to assume that all security solutions are temporary. As happened to the Maginot Line, eventually hackers will go around existing security systems. The systems must, therefore, be updated regularly and supplemented with additional tools regularly.<\/span><\/p>\n<div id=\"slidebox\"><span class=\"close\">\u00a0<\/span><!--HubSpot Call-to-Action Code --><span class=\"hs-cta-wrapper hs-cta-deferred\" id=\"hs-cta-wrapper-015aca63-e776-436f-9ef1-337ab4cf6692\" data-portal=\"5442029\" data-id=\"015aca63-e776-436f-9ef1-337ab4cf6692\"><span class=\"hs-cta-node hs-cta-015aca63-e776-436f-9ef1-337ab4cf6692\" id=\"hs-cta-015aca63-e776-436f-9ef1-337ab4cf6692\"><!--[if lte IE 8]><div id=\"hs-cta-ie-element\"><\/div><![endif]--><a href=\"https:\/\/cta-redirect.hubspot.com\/cta\/redirect\/5442029\/015aca63-e776-436f-9ef1-337ab4cf6692\" target=\"_blank\" rel=\"noopener\"><img decoding=\"async\" class=\"hs-cta-img\" id=\"hs-cta-img-015aca63-e776-436f-9ef1-337ab4cf6692\" style=\"border-width:0px;\" src=\"https:\/\/no-cache.hubspot.com\/cta\/default\/5442029\/015aca63-e776-436f-9ef1-337ab4cf6692.png\" alt=\"CTA\"><\/a><\/span><\/span><!-- end HubSpot Call-to-Action Code --><\/div>\n<p><span style=\"font-weight: 400;\">Here are some best practices and tips on how to prevent phishing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Encrypt all sensitive company information. This should occur at several levels \u2013 encryption of database records, encryption of files on your systems, encryption of all data stored in the cloud, ensuring that service providers encrypt company data that they are storing on their systems, and ensuring that data stored by partners or vendors is also encrypted. Many of the recent highly publicized leaks have occurred because a third party stored a password file that wasn\u2019t encrypted, or placed data in the cloud without properly encrypting it.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure all traffic that flows between your company and other websites is encrypted with SSL or TLS. Make sure that your SSL certificate is up-to-date and that it uses a high number of bits (at least 1024, although 2048 or more is suggested), as well as with 256-bit encryption).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">If you\u2019re taking payments from customers via the web, use something like Elavon\u2019s secure hosted payments to protect your customer\u2019s data. Make sure your provider has up-to-date PCI DSS and ISO 27001 certifications from independent auditors.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Require encryption for employees who telecommute. This is another attack vector that can be secured via encryption: Don\u2019t just secure your internal systems, but make sure that any user who connects from outside the system is secure while accessing your system.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Keep all systems current with the latest security patches and updates. As hackers and their attacks are constantly evolving, so to must your security systems.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Be cautious about your employees accessing your network via public wifi connections. Wifi set up at airports, coffee houses, or retail establishments may not be encrypted, making it easier for hackers to intercept web traffic or emails and trace login information, passwords or certificates that are used to access your network.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Beware of shortened links. Shortened links do not show a website\u2019s real name and hence, they can be more easily used to trick the recipient into clicking them. Users should be trained to be skeptical of shortened links.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Verify the target site\u2019s SSL credentials.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Make sure your endpoint security software stops malicious pop-ups. Pop-ups may be initiated by ads from a third-party site and can redirect a user to a different site, or capture personal information using iframe technology.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Verify the target site\u2019s SSL credentials.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Check read up on the evolution of malware. Since hackers are constantly refining their techniques, it behooves the security manager to do the same. Sites include ones that cover security in general, like<\/span> <span style=\"font-weight: 400;\">www.darkreading.com<\/span><span style=\"font-weight: 400;\"> and security vendor sites like<\/span><a href=\"http:\/\/www.symantec.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <span style=\"font-weight: 400;\">www.symantec.com<\/span><\/a><span style=\"font-weight: 400;\"> and<\/span><a href=\"http:\/\/www.fortinet.com\/\" target=\"_blank\" rel=\"noopener noreferrer\"> <span style=\"font-weight: 400;\">www.fortinet.com<\/span><\/a><span style=\"font-weight: 400;\">. <\/span><\/li>\n<\/ul>\n<h2><b>Employee Education on Phishing Prevention<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">The education of employees is a critical element of phishing prevention. Employees should be aware of the dangers of clicking on a dangerous link in an email. It is critical to educate all employees and do it regularly.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, many upper-level employees may believe themselves to be too important to attend training, too smart to fall for hacker\u2019s tricks. Those employees also tend to have access to sensitive data or banking sites. This is why many spear-phishing attacks target these employees specifically. Some examples of the millions of dollars that other companies have lost in these types of attacks may go a long way toward gaining their attention. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Phishing awareness education should be:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Short and engaging. The old KISS (Keep it Simple, Stupid) principle works here \u2013 regular emails that cover one or two new threats are better than a quarterly 10-pager. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Regularly delivered. Consider the turnover. Phishing awareness training should be part of the employee's orientation program. (Most experts recommend that you administer phishing protection training every two months.)<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Progression tracked. Show what you\u2019re doing to protect corporate systems and how threats are continuing to evolve. <\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Relevant to the modern-day. Don\u2019t use articles from ten years ago. There are enough fresh examples.<\/span><\/li>\n<\/ul>\n<p><strong>There are some more best practices of\u00a0employee education on phishing prevention:<\/strong><\/p>\n<div class=\"steps\">\n<ul>\n<li><span style=\"font-weight: 400;\">Teach your employees what a phishing email looks like, how to spot fakes and what to do when they get one.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Tell your employees to come forward and report possible attacks when they think they\u2019ve received one.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Periodically make your employees aware of successful phishing attacks that have happened in your industry. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Perform phishing attack simulation. Create a third-party email address and send out emails from time to time to see if you can catch anyone clicking on links when they shouldn\u2019t.<\/span><\/li>\n<li><span style=\"font-weight: 400;\">Don\u2019t leave out upper management. They need to be just as ready as the rest of your company and (as noted above) they are often specifically targeted by spear phishes and clone phishes. <\/span><\/li>\n<li><span style=\"font-weight: 400;\">Print out the list of things to look for and have your employees keep it at their desks somewhere where it will be easy to see.<\/span><\/li>\n<\/ul>\n<\/div>\n<h2><b>Summary<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Phishes and other types of malware can be stopped, but you can\u2019t put up a wall and assume it\u2019ll be secure for the foreseeable future. Just as hackers are constantly working to bypass security systems, your security systems and techniques must constantly evolve to counter the new threats.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing attacks (in which hackers send fake emails in an effort to trick users into clicking malicious links or giving away private information) have been around for decades. But they are constantly evolving, with new types of phishing attacks (such as spear phishing and clone phishing) targeting users.<\/p>\n","protected":false},"author":46,"featured_media":44358,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[878,888],"tags":[923],"class_list":["post-33542","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-msp-university","category-security-guides","tag-anti-phishing"],"acf":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33542","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/comments?post=33542"}],"version-history":[{"count":1,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33542\/revisions"}],"predecessor-version":[{"id":57118,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/posts\/33542\/revisions\/57118"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media\/44358"}],"wp:attachment":[{"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/media?parent=33542"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/categories?post=33542"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.msp360.com\/resources\/wp-json\/wp\/v2\/tags?post=33542"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}