
{"id":2568,"date":"2013-08-12T00:00:00","date_gmt":"2013-08-12T00:00:00","guid":{"rendered":"http:\/\/otava.test\/avoiding-business-disruptions-caused-by-data-breaches\/"},"modified":"2013-08-12T00:00:00","modified_gmt":"2013-08-12T00:00:00","slug":"avoiding-business-disruptions-caused-by-data-breaches","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/","title":{"rendered":"Avoiding Business Disruptions Caused by Data Breaches"},"content":{"rendered":"<p dir=\"ltr\">A recent study by the Ponemon Institute and Experian Data Breach Resolution reveals that 45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years as a result of negligence or mistakes causing the loss of confidential business information. Thirty-four percent experienced a disruption in business operations, and 24 percent were victims of misuse or theft of confidential business information (i.e., intellectual properties).<\/p>\n<figure style=\"width: 536px\" class=\"wp-caption alignnone\"><img loading=\"lazy\" decoding=\"async\" title=\"2013 Data Breaches\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\" alt=\"2013 Data Breaches\" width=\"536\" height=\"379\" \/><figcaption class=\"wp-caption-text\">2013 Data Breaches; Source: Ponemon Institute<\/figcaption><\/figure>\n<p dir=\"ltr\">Last year I wrote the article, <em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/michigan-cyber-initiative-reports-people-as-weakest-link-in-it-security\/\">Michigan Cyber Initiative Reports \u2018People\u2019 as Weakest Link in IT Security<\/a><\/em>, citing the Michigan.gov\u2019s cybersecurity advice about Personnel Security Controls &#8211; \u201cPeople are the key ingredient to a successful organization, but people can be the weakest link for security of the environment.\u201d<\/p>\n<p dir=\"ltr\">Countless data breaches can be attributed to human error, including sloppy IT security practices, like the recent healthcare data breach caused by a health IT vendor that had their firewall turned off for a month, allowing Google to index private data ( read <em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/phi-indexed-on-google-reaffirming-the-need-for-business-associate-hipaa-compliance\/\">PHI Indexed on Google? Reaffirming the Need for Business Associate HIPAA Compliance<\/a><\/em> for the whole story).<\/p>\n<p dir=\"ltr\">Mistakes happen, but risk mitigation can start with preventionary tactics such as updated and consistent staff security training. Appointing a Risk Management and Security Officer to conduct training on simple policies to ensure physical and network safety can protect business data.<\/p>\n<p dir=\"ltr\">According to a Ponemon Institute report, <em>The Human Factor in Data Protection<\/em>, examples of employee behavior that put companies at risk include connecting to the Internet via an insecure wireless network; using personal mobile devices connected to their organization\u2019s network; using generic, unencrypted USB drives and others.<\/p>\n<p dir=\"ltr\">The security of your organization also extends to the security practices put in place by your contracted vendors (business associates in the case of healthcare). For <a href=\"https:\/\/otavawebsite.wpengine.com\/operations\/locations\/michigan-cloud-and-data-centers\/\">data center<\/a> provider\/hosting practices, a few physical security precautions include:<\/p>\n<ul>\n<li><strong>Two-factor authentication<\/strong> &#8211; Anyone in the data center should be wearing a badge to identify them and need at least two forms of identification for access such as badge and access code, or biometric fingerprint scanner and badge.<\/li>\n<li><strong>Prolific use of video surveillance<\/strong> &#8211; Ask to see the video logs and how long they are kept (should be at least 90 days).<\/li>\n<li><strong>Visitor logging<\/strong> &#8211; The entries in the logbook should directly match the video surveillance tapes. Ask when the last independent auditor confirmed the match of visitor logs with the video archives. Ask who the auditor was and investigate the auditor&#8217;s company to confirm their credibility.<\/li>\n<li><strong>Procedure Documentation<\/strong> &#8211; Ask to review the documentation for the procedure to allow access by unannounced visit, phone call, or email.<\/li>\n<\/ul>\n<p>Other <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">technical security tools<\/a> that can be employed on computer networks to protect web applications and data include <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file integrity monitoring (FIM)<\/a>,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">web application firewalls (WAF)<\/a>,\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/daily-log-review\">daily log review<\/a>,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">vulnerability scanning<\/a>,\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a> and more.<\/p>\n<p>Find out other ways to avoid a data breach in:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\">Ensuring Cloud Vendor Security Transparency in the Age of Data Breaches<\/a><\/em><br \/>\nGartner recently released recommendations for gaining transparency into cloud software as a service (SaaS) contracts \u2013 including emphasis on annual security audits and certification by a third party to verify a cloud vendor\u2019s operating\/product security. Gartner also recommends that contracts \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ensuring-cloud-security-transparency-in-the-age-of-data-breaches\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-violations-cost-health-insurer-1-7-million-lessons-learned\/\">HIPAA Violations Cost Health Insurer $1.7 Million: Lessons Learned<\/a><\/em><br \/>\nReuter\u2019s reports that WellPoint, Inc., the second largest U.S. health insurer, has reached a $1.7 million settlement with the Dept. of Health and Human Services as result of a data breach that exposed over 600k health records. WellPoint\u2019s online database \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-violations-cost-health-insurer-1-7-million-lessons-learned\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/disabled-firewalls-lack-of-log-monitoring-risk-analysis-lead-to-hipaa-data-breach\/\">Disabled Firewalls, Lack of Log Monitoring &amp; Risk Analysis Lead to HIPAA Data Breach<\/a><\/em><br \/>\nThe latest HIPAA data breach case resulting in Dept. of Health and Human Services fines involves disabled server firewall protections that left the ePHI (electronic protected health information) of 17,500 patients vulnerable for at least 10 months. According to the \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/disabled-firewalls-lack-of-log-monitoring-risk-analysis-lead-to-hipaa-data-breach\/\">Continue reading \u2192<\/a><\/p>\n<p>References:<br \/>\n<a href=\"https:\/\/www.experian.com\/innovation\/business-resources\/ponemon-study-managing-cyber-security-as-business-risk.jsp\">Managing Cyber Secuirty as a Business Risk: Cyber Insurance in the Digital Age<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent study by the Ponemon Institute and Experian Data Breach Resolution reveals that 45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years as a result of negligence or mistakes causing the loss of confidential business information. Thirty-four percent experienced a disruption in business operations, and 24 percent were victims of misuse or theft of confidential business information (i.e., intellectual properties). Last year I wrote the article, Michigan Cyber Initiative Reports \u2018People\u2019 as Weakest Link in IT Security, citing the Michigan.gov\u2019s cybersecurity advice about Personnel Security Controls &#8211; \u201cPeople are the key ingredient to a successful organization, but people can be the weakest link for security of the environment.\u201d Countless data breaches can be attributed to human error, including sloppy IT security practices, like the recent healthcare data breach caused by a health IT vendor that had their firewall turned off for a month, allowing Google to index private data ( read PHI Indexed on Google? Reaffirming the Need for Business Associate HIPAA Compliance for the whole story). Mistakes happen, but risk mitigation can start with preventionary tactics such as updated and consistent staff security training. Appointing a Risk Management and&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[59],"tags":[],"other_category":[],"class_list":["post-2568","post","type-post","status-publish","format-standard","hentry","category-information-technology-tips"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Avoiding Business Disruptions Caused by Data Breaches | OTAVA<\/title>\n<meta name=\"description\" content=\"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Avoiding Business Disruptions Caused by Data Breaches\" \/>\n<meta property=\"og:description\" content=\"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-08-12T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Avoiding Business Disruptions Caused by Data Breaches\",\"datePublished\":\"2013-08-12T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\"},\"wordCount\":666,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\",\"articleSection\":[\"Information Technology Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\",\"url\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\",\"name\":\"Avoiding Business Disruptions Caused by Data Breaches | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\",\"datePublished\":\"2013-08-12T00:00:00+00:00\",\"description\":\"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Avoiding Business Disruptions Caused by Data Breaches\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Avoiding Business Disruptions Caused by Data Breaches | OTAVA","description":"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/","og_locale":"en_US","og_type":"article","og_title":"Avoiding Business Disruptions Caused by Data Breaches","og_description":"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?","og_url":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/","og_site_name":"OTAVA","article_published_time":"2013-08-12T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Avoiding Business Disruptions Caused by Data Breaches","datePublished":"2013-08-12T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/"},"wordCount":666,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png","articleSection":["Information Technology Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/","url":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/","name":"Avoiding Business Disruptions Caused by Data Breaches | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png","datePublished":"2013-08-12T00:00:00+00:00","description":"45 percent of organizations reported having suffered a data breach or security exploit over the past 2 years. How can you avoid the same fate?","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/2013-Data-Breaches.png"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/avoiding-business-disruptions-caused-by-data-breaches\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Avoiding Business Disruptions Caused by Data Breaches"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2568","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2568"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2568\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2568"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2568"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2568"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2568"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}