
{"id":2486,"date":"2013-06-13T00:00:00","date_gmt":"2013-06-13T00:00:00","guid":{"rendered":"http:\/\/otava.test\/why-what-and-how-to-encrypt-security-expert-insights\/"},"modified":"2013-06-13T00:00:00","modified_gmt":"2013-06-13T00:00:00","slug":"why-what-and-how-to-encrypt-security-expert-insights","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/","title":{"rendered":"Why, What and How to Encrypt: Security Expert Insights"},"content":{"rendered":"<p id=\"docs-internal-guid-7d766e80-3dc8-1fce-ed46-dde2b16b1894\" dir=\"ltr\">Not sure if your organization\u2019s sensitive data is properly encrypted? It\u2019s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech.<\/p>\n<p dir=\"ltr\">Heuman cites that unencrypted data is being breached regularly, and those breaches come at a staggering cost. On average, security breaches affect 42,659 individuals and cost organizations $8,275,865 (yes, that\u2019s nearly $8.3 million) to respond.<\/p>\n<p dir=\"ltr\">That price tag includes the cost of fines, penalties, legal counsel and distribution of settlements to harmed individuals, but does not include the financial equivalent of the damage made to an organization\u2019s reputation, the resources needed to respond to unannounced audits in the future or myriad other related costs.<\/p>\n<p dir=\"ltr\">\u201cWhen you think of these numbers and compare it to the cost of implementing an encryption program, you\u2019ll find the expense of the program isn\u2019t quite as high as you thought it was,\u201d he said.<\/p>\n<p dir=\"ltr\">Heuman\u2019s presentation, titled <em><a href=\"https:\/\/onlinetech.com\/events\/encryption-perspective-on-privacy-security-a-compliance\">Encryption: Perspective on Privacy, Security &amp; Compliance<\/a><\/em>, was the first of three encryption-focused presentations scheduled for the month of June. Online Tech software development manager Farooq Ahmed and Mark Stanislav of Duo Security will co-host <em><a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-software-level-linux-and-windows\">Encryption at the Software Level: Linux and Windows<\/a><\/em> on June 18 and Stanislav will join Online Tech systems support manager Steve Aiello on June 25 for <em><a href=\"https:\/\/onlinetech.com\/events\/encryption-at-the-hardware-and-storage-level\">Encryption at the Hardware and Storage Level<\/a><\/em>.<\/p>\n<p dir=\"ltr\">In his 48-minute presentation, Heuman discussed why to bother encrypting, what data to encrypt, how to encrypt it, how to document that encryption and how to test it. A brief summary of his presentation follows, but we suggest checking out the slides and a video replay of the presentation<a href=\"https:\/\/onlinetech.com\/events\/encryption-perspective-on-privacy-security-a-compliance\"> here<\/a>.<\/p>\n<p><strong>Why Bother to Encrypt<\/strong><br \/>\nIf the figures above weren\u2019t motivation enough, there are a myriad of reasons to encrypt data, including the government regulations (<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>, <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOX compliance<\/a>), frameworks and industry requirements that any organization that stores sensitive information has to deal with.<\/p>\n<p dir=\"ltr\">\u201cPrivacy and security is a life cycle, not a one-time event,\u201d Heuman said. \u201cEncryption is a control mechanism that is implemented after proper analysis has been completed and policies stating the intent have been put into place.<\/p>\n<p dir=\"ltr\">\u201cDon\u2019t jump the gun and start implementing encryption without attending to all the analysis and preparatory steps. It\u2019s important to walk through this in a logical manner and to make well thought-out decisions rather than to jump head first into technical implementation.\u201d<\/p>\n<p><strong>What to Encrypt<\/strong><br \/>\nThe first key step to proper encryption of data is to perfectly understand all of the places that data is stored.<\/p>\n<p dir=\"ltr\">\u201cIf you don\u2019t know where your data is located or how sensitive it is, you can\u2019t protect it,\u201d Heuman said. \u201cThis is not just for encryption, but any information security control. If you don\u2019t have a good understanding you either have to protect everything, which can be very expensive, or risk being paralyzed at the analysis phase and not accomplish anything at all.\u201d<\/p>\n<p dir=\"ltr\">Heuman presented an encryption project management plan that all organizations should follow:<\/p>\n<ul>\n<li>Inventory all the data repositories where encryption should be implemented<\/li>\n<li>Analyze which technique is appropriate<\/li>\n<li>Determine supported and appropriate implementation<\/li>\n<li>Develop and follow a project plan<\/li>\n<\/ul>\n<p><strong>How to Encrypt<\/strong><br \/>\nCiting recommendations from the National Institute of Standards and Technology (NIST) and the four levels of certification from the Federal Information Processing Standards, Heuman stated encryption success and the compliance organizations are hoping to achieve \u2013 the safe harbor they\u2019re looking for \u2013 rely on two factors: the algorithm that\u2019s chosen, and the key.<\/p>\n<p dir=\"ltr\">\u201cYou really have to understand the algorithm that you\u2019re required to implement and you really need to select an appropriate key length and complexity,\u201d Heuman said. \u201cAfter those decisions are made, you have to ensure that what was planned was what actually got implemented.\u201d<\/p>\n<p dir=\"ltr\">Organizations must be sure the algorithm is approved by the industry or regulation they are required to adhere to, and then ensure that a key that is sufficient, reasonable and can be secured and maintained is chosen and placed onto the devices.<\/p>\n<p dir=\"ltr\"><strong>How to Document<\/strong><\/p>\n<p dir=\"ltr\">Heuman discussed the importance of knowing what and how to properly document as part of any encryption project management plan and how to be ready for an audit by extracting documentation from analysis determinations and project plans.<\/p>\n<p dir=\"ltr\">He urged management to \u201ctrust but verify\u201d the encryption standards of their organization and to maintain all responses from vendors\/manufacturers that claim encryption is not supported.<\/p>\n<p dir=\"ltr\">\u201cExecutive oversight and interest is key,\u201d Heuman said. \u201cIf executives are plugged in, people will understand it\u2019s a priority for the organization.\u201d<\/p>\n<p><strong>How to Test<\/strong><br \/>\nThe time to find out encryption was not effective or did not provide safe harbor is not after a breach has occurred. Heuman suggests organizations conduct data breach drills and <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">disaster recovery<\/a> drills. Also perform random tests on portable USB drives from members of the workforce.<\/p>\n<p dir=\"ltr\">\u201cThere are many different ways to do it,\u201d Heuman said. \u201cMost of them are cost-effective and time effective, and it can really save you a lot of headaches later on.<\/p>\n<p dir=\"ltr\">What kind of headaches? Let\u2019s go back to those numbers:<\/p>\n<ul>\n<li>The Alaska Medicaid program was fined $1.7 million after a breach resulting from an unencrypted USB device that contained just 501 patient records was stolen.<\/li>\n<li>Massachusetts Eye and Ear Associates was fined $1.5 million after a breach resulting from the theft of an unencrypted laptop containing about 3,600 of its patients and research subjects.<\/li>\n<li>Alere Home Monitoring discovered an unencrypted laptop containing patient records was stolen from an employee\u2019s vehicle.<\/li>\n<li>Tricare Management had unencrypted backup tapes stolen, affecting 4.9 million individuals, the largest security breach to date.<\/li>\n<\/ul>\n<p dir=\"ltr\">We thank Chris Heuman for his time and expertise. And we thank him for saying the following during his presentation:<\/p>\n<p dir=\"ltr\">\u201cOnline Tech is one of the very few providers in this space that takes privacy, security and compliance seriously and has really implemented and tested their controls.\u201d<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Not sure if your organization\u2019s sensitive data is properly encrypted? It\u2019s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Heuman cites that unencrypted data is being breached regularly, and those breaches come at a staggering cost. On average, security breaches affect 42,659 individuals and cost organizations $8,275,865 (yes, that\u2019s nearly $8.3 million) to respond. That price tag includes the cost of fines, penalties, legal counsel and distribution of settlements to harmed individuals, but does not include the financial equivalent of the damage made to an organization\u2019s reputation, the resources needed to respond to unannounced audits in the future or myriad other related costs. \u201cWhen you think of these numbers and compare it to the cost of implementing an encryption program, you\u2019ll find the expense of the program isn\u2019t quite as high as you thought it was,\u201d he said. Heuman\u2019s presentation, titled Encryption: Perspective on Privacy, Security &amp; Compliance, was the first of three encryption-focused presentations scheduled for the month of June. Online Tech software development manager Farooq Ahmed and Mark Stanislav of Duo Security will co-host Encryption at the Software&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2486","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Why, What and How to Encrypt: Security Expert Insights | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why, What and How to Encrypt: Security Expert Insights\" \/>\n<meta property=\"og:description\" content=\"Not sure if your organization\u2019s sensitive data is properly encrypted? It\u2019s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Heuman cites that unencrypted data is being breached regularly, and those breaches come at a staggering cost. On average, security breaches affect 42,659 individuals and cost organizations $8,275,865 (yes, that\u2019s nearly $8.3 million) to respond. That price tag includes the cost of fines, penalties, legal counsel and distribution of settlements to harmed individuals, but does not include the financial equivalent of the damage made to an organization\u2019s reputation, the resources needed to respond to unannounced audits in the future or myriad other related costs. \u201cWhen you think of these numbers and compare it to the cost of implementing an encryption program, you\u2019ll find the expense of the program isn\u2019t quite as high as you thought it was,\u201d he said. Heuman\u2019s presentation, titled Encryption: Perspective on Privacy, Security &amp; Compliance, was the first of three encryption-focused presentations scheduled for the month of June. Online Tech software development manager Farooq Ahmed and Mark Stanislav of Duo Security will co-host Encryption at the Software...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-06-13T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Why, What and How to Encrypt: Security Expert Insights\",\"datePublished\":\"2013-06-13T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\"},\"wordCount\":998,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\",\"url\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\",\"name\":\"Why, What and How to Encrypt: Security Expert Insights | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-06-13T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why, What and How to Encrypt: Security Expert Insights\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Why, What and How to Encrypt: Security Expert Insights | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/","og_locale":"en_US","og_type":"article","og_title":"Why, What and How to Encrypt: Security Expert Insights","og_description":"Not sure if your organization\u2019s sensitive data is properly encrypted? It\u2019s time to be sure. Chris Heuman, Practice Leader for RISC Management and Consulting, broke down the reasons why (and how) in the latest webinar hosted by Online Tech. Heuman cites that unencrypted data is being breached regularly, and those breaches come at a staggering cost. On average, security breaches affect 42,659 individuals and cost organizations $8,275,865 (yes, that\u2019s nearly $8.3 million) to respond. That price tag includes the cost of fines, penalties, legal counsel and distribution of settlements to harmed individuals, but does not include the financial equivalent of the damage made to an organization\u2019s reputation, the resources needed to respond to unannounced audits in the future or myriad other related costs. \u201cWhen you think of these numbers and compare it to the cost of implementing an encryption program, you\u2019ll find the expense of the program isn\u2019t quite as high as you thought it was,\u201d he said. Heuman\u2019s presentation, titled Encryption: Perspective on Privacy, Security &amp; Compliance, was the first of three encryption-focused presentations scheduled for the month of June. Online Tech software development manager Farooq Ahmed and Mark Stanislav of Duo Security will co-host Encryption at the Software...","og_url":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/","og_site_name":"OTAVA","article_published_time":"2013-06-13T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Why, What and How to Encrypt: Security Expert Insights","datePublished":"2013-06-13T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/"},"wordCount":998,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/","url":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/","name":"Why, What and How to Encrypt: Security Expert Insights | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-06-13T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/why-what-and-how-to-encrypt-security-expert-insights\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Why, What and How to Encrypt: Security Expert Insights"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2486","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2486"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2486\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2486"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2486"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2486"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2486"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}