
{"id":1878,"date":"2012-04-25T00:00:00","date_gmt":"2012-04-25T00:00:00","guid":{"rendered":"http:\/\/otava.test\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/"},"modified":"2012-04-25T00:00:00","modified_gmt":"2012-04-25T00:00:00","slug":"two-factor-authentication-to-meet-hipaa-and-pci-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/","title":{"rendered":"Two-Factor Authentication to Meet HIPAA and PCI Compliance"},"content":{"rendered":"<h3><span class=\"ez-toc-section\" id=\"What_is_Two-Factor_Authentication\"><\/span>What is <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/two-factor-authentication-for-vpn-login-faq\/\">Two-Factor Authentication?<\/a><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>The simplest example may be the use of an ATM\/debit card &#8211; this combines two factors; one is <em>something you own<\/em> (the card) and the other is <em>something you know<\/em> (the PIN).<\/p>\n<p>Employees and other users may need to log into a private network to access data from a remote location, using a VPN (virtual private network). In this scenario, one authentication factor includes logging into a web-based system with a username and password.\u00a0The second authentication factor may include the use of a cell phone &#8211; with a smartphone, you can register your phone number with the system and receive a request to approve.<\/p>\n<p>Or, by using a passcode via text message, you can log into the system with the randomized numbers sent to your phone. You can even answer a phone call and press a key in order to authenticate you are the authorized account holder.<\/p>\n<p>There are other authentication factors that can be used &#8211; for example, biometrics requires something specific to you, from a fingerprint to voice recognition. Or, you can use something physical you own, like a keyfob.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Whos_Using_Two-Factor_Authentication\"><\/span>Who&#8217;s Using Two-Factor Authentication?<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>One well-known example of a company using two-factor is Google &#8211; they&#8217;ve implemented their version called &#8220;2-step verification&#8221; for Google account holders. After signing into your account with your email address and password, Google requires you to enter a verification code sent to you via text message or generated by your smartphone.<\/p>\n<figure style=\"width: 500px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" title=\"Google's 2-Step Verification\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\" alt=\"Google's 2-Step Verification\" width=\"500\" height=\"176\" \/><figcaption class=\"wp-caption-text\">Google&#8217;s 2-Step Verification<\/figcaption><\/figure>\n<p>Any organization concerned about security should consider implementing two-factor authentication <a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/two-factor-authentication-for-vpn-login-faq\/\">for their VPN<\/a> (virtual private network), regardless of their compliance requirements. Two-factor authentication lowers your risk of a data breach caused by unauthorized remote access to sensitive data. <strong>If you use your cellphone as a means of secondary authentication, consider an alternative method to text messaging, as weaknesses in the cellular network can cause <\/strong><a href=\"https:\/\/www.theverge.com\/2017\/9\/18\/16328172\/sms-two-factor-authentication-hack-password-bitcoin\" target=\"_blank\" rel=\"noopener noreferrer\"><strong>messages to be intercepted<\/strong>.<\/a><\/p>\n<h3><span class=\"ez-toc-section\" id=\"PCI_DSS_Compliance_Requirements\"><\/span>PCI DSS Compliance Requirements<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Two-factor is required by <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI compliance<\/a>. The Payment Card Industry Data Security Standards (PCI DSS) mandate that organizations who &#8220;hold, process, or pass cardholder information&#8221; meet a minimum level of security. Part of this security is protecting remote access logins with strong authentication. PCI requirement 8.0 states organizations must assign a unique ID to each person with computer access.<\/p>\n<p>Specifically, section 8.3 requires organizations to implement two-factor authentication for remote access to the network by employees, administrators, and third parties.\u00a0To achieve compliance with this requirement, you should use technologies such as remote authentication and dial-in service (RADIUS) or terminal access controller access control system (TACACS) with tokens; or other technologies that facilitate two-factor authentication.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Two-Factor_Authentication_for_HIPAA_Compliance\"><\/span>Two-Factor Authentication for HIPAA Compliance<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Two-factor authentication is also recommended in order to meet <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliance<\/a>, as it adds an extra layer of security that can prevent unauthorized access.<\/p>\n<p>A recent article from ModernHealthcare.com demonstrates the need for <a href=\"https:\/\/www.modernhealthcare.com\/article\/20160330\/NEWS\/303299996\" target=\"_blank\" rel=\"noopener noreferrer\">strong authentication <\/a>in the healthcare industry. The Privacy and Security Tiger Team of the Health IT Policy Committee is proposing rules for Stage 2 meaningful use that will govern security recommendations to authenticate the identity of patients as they log into their patient portals to download or view their personal health records.<\/p>\n<p>While the policy committee intends to propose a rule requiring at least single-factor authentication while accessing records via a patient portal, two-factor authentication can offer significantly more security with minimal effort and cost.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Related_Resources\"><\/span>Related Resources<span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Read our <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/a-quick-tech-tutorial-two-factor-authentication\/\">Quick Tech Tutorial about two factor authentication<\/a> for further information.<\/p>\n<p>For more information about HIPAA compliance, visit our <a href=\"https:\/\/www.onlinetech.com\/component\/finder\/search?q=HIPAA&amp;f=3&amp;Itemid=145\" target=\"_blank\" rel=\"noopener noreferrer\">HIPAA resources<\/a> or download our <a href=\"https:\/\/web.otava.com\/white-papers\/hipaa-compliant-hosting-white-paper\" target=\"_blank\" rel=\"noopener noreferrer\">free HIPAA white paper<\/a>.<\/p>\n<p>Find other PCI compliant resources <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">here<\/a>. Watch this webinar or read the transcript, <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">PCI Compliance: Detailed Requirements<\/a>, for a comprehensive overview of the required technology to achieve PCI DSS compliance.<\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.pcisecuritystandards.org\/documents\/PCI_DSS_v3-2.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">PCI DSS 3.2 Requirements and Security Assessment Procedures <\/a>(PDF)<br \/>\n<a href=\"https:\/\/www.informationweek.com\/whitepaper\/Infrastructure\/Network-Systems-Management\/the-right-way-to-prove-identity-establish-trust-wp1330538585?articleID=191704303&amp;itc=SBX_iwk_fture_wp_default\">Defender 5: The Right Way to Prove, Identify and Establish Trust from Quest Software<\/a><br \/>\n<a href=\"https:\/\/www.modernhealthcare.com\/article\/20120424\/NEWS\/304249988?AllowView=VW8xUmo5Q21TcWJOb1gzb0tNN3RLZ0h0MWg5SVgra3NZRzROR3l0WWRMVGJVUDhGRWxiNUtpQzMyWmV2NVhnWUpiU3A=&amp;utm_source=link-20120424-NEWS-304249988&amp;utm_medium=email&amp;utm_campaign=hits\"> Federal Privacy Work Group Wants EHRs to Verify Patient ID<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is Two-Factor Authentication? The simplest example may be the use of an ATM\/debit card &#8211; this combines two factors; one is something you own (the card) and the other is something you know (the PIN). Employees and other users may need to log into a private network to access data from a remote location, using a VPN (virtual private network). In this scenario, one authentication factor includes logging into a web-based system with a username and password.\u00a0The second authentication factor may include the use of a cell phone &#8211; with a smartphone, you can register your phone number with the system and receive a request to approve. Or, by using a passcode via text message, you can log into the system with the randomized numbers sent to your phone. You can even answer a phone call and press a key in order to authenticate you are the authorized account holder. There are other authentication factors that can be used &#8211; for example, biometrics requires something specific to you, from a fingerprint to voice recognition. Or, you can use something physical you own, like a keyfob. Who&#8217;s Using Two-Factor Authentication? One well-known example of a company using two-factor is Google&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[47,48],"tags":[214,83,100,159,78],"other_category":[],"class_list":["post-1878","post","type-post","status-publish","format-standard","hentry","category-compliance","category-cybersecurity","tag-2fa","tag-cybersecurity","tag-hipaa-compliance","tag-pci-compliance","tag-two-factor-authentication"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Two-Factor Authentication to Meet HIPAA and PCI Compliance | OTAVA<\/title>\n<meta name=\"description\" content=\"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Two-Factor Authentication to Meet HIPAA and PCI Compliance\" \/>\n<meta property=\"og:description\" content=\"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-04-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Two-Factor Authentication to Meet HIPAA and PCI Compliance\",\"datePublished\":\"2012-04-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\"},\"wordCount\":665,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\",\"keywords\":[\"2FA\",\"cybersecurity\",\"HIPAA compliance\",\"PCI compliance\",\"two factor authentication\"],\"articleSection\":[\"Compliance\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\",\"name\":\"Two-Factor Authentication to Meet HIPAA and PCI Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\",\"datePublished\":\"2012-04-25T00:00:00+00:00\",\"description\":\"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Two-Factor Authentication to Meet HIPAA and PCI Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Two-Factor Authentication to Meet HIPAA and PCI Compliance | OTAVA","description":"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Two-Factor Authentication to Meet HIPAA and PCI Compliance","og_description":"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.","og_url":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/","og_site_name":"OTAVA","article_published_time":"2012-04-25T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Two-Factor Authentication to Meet HIPAA and PCI Compliance","datePublished":"2012-04-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/"},"wordCount":665,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png","keywords":["2FA","cybersecurity","HIPAA compliance","PCI compliance","two factor authentication"],"articleSection":["Compliance","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/","url":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/","name":"Two-Factor Authentication to Meet HIPAA and PCI Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png","datePublished":"2012-04-25T00:00:00+00:00","description":"Any organization concerned about security should consider implementing two-factor authentication for their VPN to lower the risk of a data breach.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/step1and2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/two-factor-authentication-to-meet-hipaa-and-pci-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Two-Factor Authentication to Meet HIPAA and PCI Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1878","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=1878"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/1878\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=1878"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=1878"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=1878"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=1878"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}