
{"id":2666,"date":"2013-10-08T00:00:00","date_gmt":"2013-10-08T00:00:00","guid":{"rendered":"http:\/\/otava.test\/online-techs-data-security-video-series-what-is-data-encryption\/"},"modified":"2013-10-08T00:00:00","modified_gmt":"2013-10-08T00:00:00","slug":"online-techs-data-security-video-series-what-is-data-encryption","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/","title":{"rendered":"Online Tech&#8217;s Data Security Video Series: What is Data Encryption?"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. <strong><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/what-is-data-encryption\">Watch the full video on our site<\/a>.<\/strong><\/p>\n<p>Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">Encryption<\/a> is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data.<\/p>\n<figure id=\"attachment_13808\" aria-describedby=\"caption-attachment-13808\" style=\"width: 559px\" class=\"wp-caption alignleft\"><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/what-is-data-encryption\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-13808 \" title=\"What is Data Encryption? Visit our site to watch the video.\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\" alt=\"What is Data Encryption? Visit our site to watch the video.\" width=\"559\" height=\"314\" \/><\/a><figcaption id=\"caption-attachment-13808\" class=\"wp-caption-text\">What is Data Encryption? Visit our site to watch the video.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a> page.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n<p>Related Articles:<br \/>\n<em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ceos-discuss-encryption-for-healthcare\/\">CEOs Discuss Encryption for Healthcare<\/a><\/em><br \/>\nLast week marked an important deadline for physicians, HIPAA covered entities (CEs), business associates (BAs), and subcontractors to comply with HIPAA\u2019s privacy and security requirements. Now any healthcare organization that supports the processing, facilitation, or collection of PHI (protected health \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/ceos-discuss-encryption-for-healthcare\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/defense-in-depth-strategy-cloud-encryption-is-just-one-tool\/\">Defense in Depth Strategy: Cloud Encryption is Just One Tool<\/a><\/em><br \/>\nDefense in depth \u2013 what does it mean? NSA.gov, the U.S. National Security Agency, refers to the term as a \u201cpractical strategy for achieving Information Assurance in today\u2019s highly networked environments,\u201d citing Information Assurance to include the protection of information \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/defense-in-depth-strategy-cloud-encryption-is-just-one-tool\/\">Continue reading \u2192<\/a><\/p>\n<p><em><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\">HIPAA Encryption in the Cloud: Don\u2019t Sacrifice Performance for Security<\/a><\/em><br \/>\nEarlier this year, OCR (Office for Civil Rights) Director Leon Rodriguez was quoted on the topic of HIPAA encryption: \u201c\u2026regardless of size, covered entities must take action and will be held accountable for safeguarding their patients\u2019 health information. Encryption is an \u2026 <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/hipaa-encryption-in-the-cloud-dont-sacrifice-performance-for-security\/\">Continue reading \u2192<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. Watch the full video on our site. Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. Encryption is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data. Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0encryption in the cloud. Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0full arsenal of security services\u00a0for a layered-defense approach to ensuring data is protected, even if&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2666","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Online Tech&#039;s Data Security Video Series: What is Data Encryption? | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Online Tech&#039;s Data Security Video Series: What is Data Encryption?\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. Watch the full video on our site. Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. Encryption is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data. Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0encryption in the cloud. Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0full arsenal of security services\u00a0for a layered-defense approach to ensuring data is protected, even if...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-08T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Online Tech&#8217;s Data Security Video Series: What is Data Encryption?\",\"datePublished\":\"2013-10-08T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\"},\"wordCount\":416,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\",\"url\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\",\"name\":\"Online Tech's Data Security Video Series: What is Data Encryption? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\",\"datePublished\":\"2013-10-08T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Online Tech&#8217;s Data Security Video Series: What is Data Encryption?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Online Tech's Data Security Video Series: What is Data Encryption? | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/","og_locale":"en_US","og_type":"article","og_title":"Online Tech's Data Security Video Series: What is Data Encryption?","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello leads a data security series of videos on data encryption by explaining what it is and the history of the process. Watch the full video on our site. Data encryption has been around since the Ceasar Cipher, an algorithm used in the Roman times. Encryption is scrambling data that is unreadable to people that do not have the key. Aiello describes how a key is the map to the encrypted data (cipher text) that is decrypted into plain text. It is used to keep unauthorized people from viewing sensitive data. Learn more about encryption of data at rest and in transit on our Defense in Depth page. The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0encryption in the cloud. Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0full arsenal of security services\u00a0for a layered-defense approach to ensuring data is protected, even if...","og_url":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/","og_site_name":"OTAVA","article_published_time":"2013-10-08T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Online Tech&#8217;s Data Security Video Series: What is Data Encryption?","datePublished":"2013-10-08T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/"},"wordCount":416,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/","url":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/","name":"Online Tech's Data Security Video Series: What is Data Encryption? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg","datePublished":"2013-10-08T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/What-is-Data-Encryption-Video-Screencap.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/online-techs-data-security-video-series-what-is-data-encryption\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Online Tech&#8217;s Data Security Video Series: What is Data Encryption?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2666","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2666"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2666\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2666"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2666"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2666"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2666"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}