
{"id":2067,"date":"2012-10-01T00:00:00","date_gmt":"2012-10-01T00:00:00","guid":{"rendered":"http:\/\/otava.test\/announcing-your-complete-technical-security-toolkit\/"},"modified":"2012-10-01T00:00:00","modified_gmt":"2012-10-01T00:00:00","slug":"announcing-your-complete-technical-security-toolkit","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/","title":{"rendered":"Announcing: Your Complete Technical Security Toolkit"},"content":{"rendered":"<p>What&#8217;s in your technical security toolkit? Each tool covers different aspects of your hosting environment and ensures server and database protection. By taking a layered approach to security, you can cover all of your bases and prevent a data breach.<\/p>\n<p>At Online Tech, we&#8217;ve unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity. All of the managed services are required by <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI DSS<\/a> (Payment Card Industry Data Security Standard) for organizations that accept, transmit or process credit cardholder data, and they are highly recommended for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a> (Health Insurance Portability and Accountability Act)\/HITECH (Health Information Technology for Economic and Clinical Health); organizations that deal with protected\/patient health information.<\/p>\n<p>Click on each to learn more:<\/p>\n<table>\n<tbody>\n<tr>\n<th colspan=\"2\">\n<h2><span class=\"ez-toc-section\" id=\"Technical_Security_Services\"><\/span>Technical Security Services<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<\/th>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\" alt=\"daily-log-review\" width=\"100\" height=\"100\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\"><strong>Daily Log Review<\/strong><\/a><br \/>\nWhile some <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI hosting providers<\/a> may offer logging (tracking user activity, transporting and storing log events), Online Tech provides the complete logging experience with daily log review, analysis, and monthly reporting.<\/td>\n<\/tr>\n<tr>\n<td><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/file-integrity-monitoring.png\" alt=\"file-integrity-monitoring\" width=\"100\" height=\"100\" \/><\/a><\/td>\n<td><a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\"><strong>File Integrity Monitoring (FIM)<\/strong><\/a><br \/>\nMonitoring your files and systems provides valuable insight into your technical environment and provides an additional layer of data security. File integrity monitoring (FIM) is a service that can monitor any changes made to your files.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/web-application-firewall.png\" alt=\"web-application-firewall\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>Web Application Firewall (WAF)<\/strong><\/a><br \/>\nProtect your web servers and databases from malicious online attacks by investing in a web application firewall (WAF). A network firewall\u2019s open port allows Internet traffic to access your websites, but it can also open up servers to potential application attacks (database commands to delete or extract data are sent through a web application to the backend database) and other malicious attacks.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/two-factor-authentication.png\" alt=\"two-factor-authentication\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>Two-Factor Authentication<\/strong><\/a><br \/>\nOnline Tech offers two-factor authentication for VPN (Virtual Private Network) access as an optimal security measure to protect against online fraud and unauthorized access for clients that connect to their networks from a remote location.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/vulnerability-scanning.png\" alt=\"vulnerability-scanning\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>Vulnerability Scanning<\/strong><\/a><br \/>\nVulnerability scanning checks your firewalls, networks and open ports. It is a web application that can detect outdated versions of software, web applications that aren\u2019t securely coded, or misconfigured networks. If you need to meet PCI compliance, you need to run vulnerability scans and produce a report quarterly.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/patch-management.png\" alt=\"patch-management\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>Patch Management<\/strong><\/a><br \/>\nWhy is patch management so important? If your servers aren\u2019t updated and managed properly, your data and applications are left vulnerable to hackers, identity thieves and other malicious attacks against your systems.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/anti-virus.png\" alt=\"anti-virus\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>Antivirus<\/strong><\/a><br \/>\nAntivirus software can detect and remove malware in order to protect your data from malicious attacks. Significantly reduce your risks of data theft or unauthorized access by investing in a simple and effective solution for optimal server protection.<\/td>\n<\/tr>\n<tr>\n<td><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/ssl-certificate.png\" alt=\"ssl-certificate\" width=\"100\" height=\"100\" \/><\/td>\n<td><a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\"><strong>SSL Certificate<\/strong><\/a><br \/>\nIn order to safely transmit information online, a SSL (Secure Sockets Layer) certificate provides the encryption of sensitive data, including financial and healthcare. A SSL certificate verifies the identity of a website, allowing web browsers to display a secure website.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Technical security is just one aspect of a complete security solution &#8211; the physical security of your hosting environment and administrative security (policies, contracts, and staff training) allow for ultimate security. Read more about our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Physical Security<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Administrative Security<\/a>.<\/p>\n<p>Not sure what the PCI requirements, or HIPAA hosting requirements are? Download and read our <a href=\"https:\/\/web.otava.com\/pci-compliant-data-needs\">PCI Compliant Hosting<\/a> white paper, or our <a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting<\/a> white paper.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>What&#8217;s in your technical security toolkit? Each tool covers different aspects of your hosting environment and ensures server and database protection. By taking a layered approach to security, you can cover all of your bases and prevent a data breach. At Online Tech, we&#8217;ve unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity. All of the managed services are required by PCI DSS (Payment Card Industry Data Security Standard) for organizations that accept, transmit or process credit cardholder data, and they are highly recommended for HIPAA (Health Insurance Portability and Accountability Act)\/HITECH (Health Information Technology for Economic and Clinical Health); organizations that deal with protected\/patient health information. Click on each to learn more: Technical Security Services Daily Log Review While some PCI hosting providers may offer logging (tracking user activity, transporting and storing log events), Online Tech provides the complete logging experience with daily log review, analysis, and monthly reporting. File Integrity Monitoring (FIM) Monitoring your files and systems provides valuable insight into your technical environment and provides an additional layer of data security. File integrity monitoring (FIM) is a service that can monitor any changes made to your files. Web Application&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2067","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Announcing: Your Complete Technical Security Toolkit | OTAVA<\/title>\n<meta name=\"description\" content=\"We&#039;ve unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Announcing: Your Complete Technical Security Toolkit\" \/>\n<meta property=\"og:description\" content=\"We&#039;ve unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2012-10-01T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Announcing: Your Complete Technical Security Toolkit\",\"datePublished\":\"2012-10-01T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\"},\"wordCount\":546,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\",\"url\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\",\"name\":\"Announcing: Your Complete Technical Security Toolkit | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"datePublished\":\"2012-10-01T00:00:00+00:00\",\"description\":\"We've unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Announcing: Your Complete Technical Security Toolkit\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Announcing: Your Complete Technical Security Toolkit | OTAVA","description":"We've unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/","og_locale":"en_US","og_type":"article","og_title":"Announcing: Your Complete Technical Security Toolkit","og_description":"We've unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.","og_url":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/","og_site_name":"OTAVA","article_published_time":"2012-10-01T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Announcing: Your Complete Technical Security Toolkit","datePublished":"2012-10-01T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/"},"wordCount":546,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/","url":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/","name":"Announcing: Your Complete Technical Security Toolkit | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","datePublished":"2012-10-01T00:00:00+00:00","description":"We've unveiled our IT security toolkit we recommend to any industry concerned with data confidentiality, privacy and integrity.","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/daily-log-review.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/announcing-your-complete-technical-security-toolkit\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Announcing: Your Complete Technical Security Toolkit"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2067","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2067"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2067\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2067"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2067"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2067"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2067"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}