
{"id":2541,"date":"2013-07-25T00:00:00","date_gmt":"2013-07-25T00:00:00","guid":{"rendered":"http:\/\/otava.test\/health-it-security-raising-the-bar-to-protect-phi\/"},"modified":"2013-07-25T00:00:00","modified_gmt":"2013-07-25T00:00:00","slug":"health-it-security-raising-the-bar-to-protect-phi","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/","title":{"rendered":"Health IT Security: Raising the Bar to Protect PHI"},"content":{"rendered":"<p>The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a>, Duo Security Regional Director Zoe Lindsey said in a recent Online Tech-sponsored webinar.<\/p>\n<p>\u201cIt\u2019s the simplest and most cost-effective measure you can take to prevent attacker access before it happens,\u201d Lindsey said in her 30-minute presentation, <em><a href=\"https:\/\/onlinetech.com\/events\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\">Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption<\/a>.<\/em><\/p>\n<p>Lindsey was joined on the <a href=\"https:\/\/onlinetech.com\/events\/webinars\">webinar<\/a> by Online Tech Director of Healthcare Vertical April Sage, who noted that the leader in secure, compliant hosting services uses Duo products in-house and that a vast majority of its healthcare clients use Duo for secure VPN (Virtual Private Network) connections to their servers, as well.<\/p>\n<p>\u201cWe don\u2019t receive remuneration, but we sure do recommend that anyone that needs to mitigate password and protect PHI uses some form of two-factor authentication,\u201d Sage said. \u201cAnd we know that the simplicity of setup we see with Duo is far and beyond anything else we\u2019ve seen.\u201d<\/p>\n<p>Lindsey started her presentation by stressing the importance of a strong first line of defense when you\u2019re talking about protecting protected health information (PHI).<\/p>\n<p>\u201cThere really is no such thing as a data breach that, at some level, does not involve stolen credentials,\u201d she said. \u201cWhether it\u2019s stealing an active session on a user system, stealing a username and password, stealing a cookie for logging in, etc. One way or another, a breach is going to occur after a hacker has obtained a user\u2019s credentials.<\/p>\n<p>\u201cAnd the truth is, there is no better protection from that type of compromise than two-factor authentication.\u201d<\/p>\n<p>While healthcare organizations strive to remain <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliant<\/a>, Lindsey pointed out that the fees associated with failure to comply with those regulations are not even the biggest financial risk facing the industry.<\/p>\n<p>In 2011, she said, there was $30.9 billion in losses as a result of medical identity theft.<\/p>\n<p>\u201cIt\u2019s a one-stop shop for attackers,\u201d she said, adding that within PHI records hackers can gain access to social security numbers, credit card information from prior payments, information on family and emergency contacts that can be used for identity theft and more sensitive data. \u201cIt doesn\u2019t take very many of those records to be exposed before the cost of the attack is less than the benefit they would gain by getting access to that information.\u201d<\/p>\n<p>Lindsey said barriers for two-factor authentication \u201cmade it a tough pill to swallow in the past.\u201d Challenges included a complex user enrollment and user management; a complex deployment and administration; a terrible end-user experience, a lack of second-factor authentication options and a high cost.<\/p>\n<p>She claims in her 30-minute presentation that Duo Security, the first company to bring a two-factor authentication solution using smartphones and tablets to market, mitigates each those challenges. The service is easy to deploy and is easily scalable, is easy to manage (users enroll themselves) and easy to use (smartphones hold the authentication key).<\/p>\n<p>When Twitter was getting Duo deployed, it took their administrators 50 minutes to get the service set up and deployed in their production environment. All of its users were able to self-enroll within 48 hours with no further administrator access.<\/p>\n<p>\u201cDuo\u2019s mission is to solve the biggest problems in security today: Prevent account takeover and online fraud before it happens,\u201d Lindsey said. \u201cWe\u2019re not a company that moved into information security. We\u2019re a company with deep roots in information security that saw an opportunity to raise the bar for security in the market.\u201d<\/p>\n<p><a href=\"https:\/\/onlinetech.com\/events\/achieving-cost-effective-scalable-and-secure-phi-access-without-workflow-disruption\">Click here<\/a> to watch a replay of the webinar or to access the slides from the presentation.<\/p>\n<p><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\"><img loading=\"lazy\" decoding=\"async\" class=\"alignleft\" title=\"HIPAA Compliant Hosting White Paper\" src=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" alt=\"HIPAA Compliant Hosting White Paper\" width=\"294\" height=\"216\" \/><\/a>Keeping data stored in a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a>\u00a0with an audited\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting<\/a>\u00a0provider monitoring and maintaining the facility can help prevent data breaches targeted at stored\/archived data.<\/p>\n<p>Read our\u00a0<strong><a href=\"https:\/\/www.onlinetech.com\/resources\/white-papers\/hipaa-compliant-data-centers\">HIPAA Compliant Hosting white paper<\/a><\/strong>\u00a0as it explores the impact of HITECH and HIPAA on data centers. It includes a description of a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\/compliance\/hipaa-compliant-data-centers\">HIPAA compliant data center<\/a>\u00a0IT architecture, contractual requirements, benefits\u00a0and risks of data center outsourcing, and vendor selection criteria.<\/p>\n<p>Sign up for our upcoming webinar, <em><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">How to Achieve Maximum ROI and Patient Satisfaction via EMR<\/a><\/em>, next Tuesday at 2PM ET, July 30. Join Sandy Vosk and Steven Caruso of ImageDoc USA for guidance on EMR implementation, intended to improve profitability and efficiency while reducing your risks before, during and after software adoption &amp; implementation.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a recent Online Tech-sponsored webinar. \u201cIt\u2019s the simplest and most cost-effective measure you can take to prevent attacker access before it happens,\u201d Lindsey said in her 30-minute presentation, Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption. Lindsey was joined on the webinar by Online Tech Director of Healthcare Vertical April Sage, who noted that the leader in secure, compliant hosting services uses Duo products in-house and that a vast majority of its healthcare clients use Duo for secure VPN (Virtual Private Network) connections to their servers, as well. \u201cWe don\u2019t receive remuneration, but we sure do recommend that anyone that needs to mitigate password and protect PHI uses some form of two-factor authentication,\u201d Sage said. \u201cAnd we know that the simplicity of setup we see with Duo is far and beyond anything else we\u2019ve seen.\u201d Lindsey started her presentation by stressing the importance of a strong first line of defense when you\u2019re talking about protecting protected health information (PHI)&#8230;.<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2541","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Health IT Security: Raising the Bar to Protect PHI | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Health IT Security: Raising the Bar to Protect PHI\" \/>\n<meta property=\"og:description\" content=\"The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a recent Online Tech-sponsored webinar. \u201cIt\u2019s the simplest and most cost-effective measure you can take to prevent attacker access before it happens,\u201d Lindsey said in her 30-minute presentation, Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption. Lindsey was joined on the webinar by Online Tech Director of Healthcare Vertical April Sage, who noted that the leader in secure, compliant hosting services uses Duo products in-house and that a vast majority of its healthcare clients use Duo for secure VPN (Virtual Private Network) connections to their servers, as well. \u201cWe don\u2019t receive remuneration, but we sure do recommend that anyone that needs to mitigate password and protect PHI uses some form of two-factor authentication,\u201d Sage said. \u201cAnd we know that the simplicity of setup we see with Duo is far and beyond anything else we\u2019ve seen.\u201d Lindsey started her presentation by stressing the importance of a strong first line of defense when you\u2019re talking about protecting protected health information (PHI)....\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-07-25T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Health IT Security: Raising the Bar to Protect PHI\",\"datePublished\":\"2013-07-25T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\"},\"wordCount\":754,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\",\"url\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\",\"name\":\"Health IT Security: Raising the Bar to Protect PHI | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\",\"datePublished\":\"2013-07-25T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Health IT Security: Raising the Bar to Protect PHI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Health IT Security: Raising the Bar to Protect PHI | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/","og_locale":"en_US","og_type":"article","og_title":"Health IT Security: Raising the Bar to Protect PHI","og_description":"The healthcare field has become a target for cyber-criminals because of the wide array of sensitive data it protects. Organizations looking to protect that data should first turn to two-factor authentication, Duo Security Regional Director Zoe Lindsey said in a recent Online Tech-sponsored webinar. \u201cIt\u2019s the simplest and most cost-effective measure you can take to prevent attacker access before it happens,\u201d Lindsey said in her 30-minute presentation, Achieving Cost-Effective, Scalable and Secure PHI Access Without Workflow Disruption. Lindsey was joined on the webinar by Online Tech Director of Healthcare Vertical April Sage, who noted that the leader in secure, compliant hosting services uses Duo products in-house and that a vast majority of its healthcare clients use Duo for secure VPN (Virtual Private Network) connections to their servers, as well. \u201cWe don\u2019t receive remuneration, but we sure do recommend that anyone that needs to mitigate password and protect PHI uses some form of two-factor authentication,\u201d Sage said. \u201cAnd we know that the simplicity of setup we see with Duo is far and beyond anything else we\u2019ve seen.\u201d Lindsey started her presentation by stressing the importance of a strong first line of defense when you\u2019re talking about protecting protected health information (PHI)....","og_url":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/","og_site_name":"OTAVA","article_published_time":"2013-07-25T00:00:00+00:00","og_image":[{"url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Health IT Security: Raising the Bar to Protect PHI","datePublished":"2013-07-25T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/"},"wordCount":754,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/","url":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/","name":"Health IT Security: Raising the Bar to Protect PHI | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage"},"thumbnailUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif","datePublished":"2013-07-25T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#primaryimage","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2019\/04\/hipaa-white-paper.gif"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/health-it-security-raising-the-bar-to-protect-phi\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Health IT Security: Raising the Bar to Protect PHI"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2541"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2541\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2541"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}