
{"id":2680,"date":"2013-10-15T00:00:00","date_gmt":"2013-10-15T00:00:00","guid":{"rendered":"http:\/\/otava.test\/information-security-your-complete-guides-to-data-regulatory-compliance\/"},"modified":"2013-10-15T00:00:00","modified_gmt":"2013-10-15T00:00:00","slug":"information-security-your-complete-guides-to-data-regulatory-compliance","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/","title":{"rendered":"Information Security: Your Complete Guides to Data Regulatory Compliance"},"content":{"rendered":"<p dir=\"ltr\">Our online guides to information security (infosec) and compliance are scattered across our <a href=\"https:\/\/otavawebsite.wpengine.com\/\">website<\/a> and <a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/\">blog<\/a>, but here\u2019s a roundup of our best and most relevant resources that relate to this year\u2019s <a href=\"https:\/\/www.onlinetech.com\/events\/detroit-secureworld-2013\">Detroit SecureWorld<\/a> security and compliance sessions, tomorrow and Thursday.<\/p>\n<p dir=\"ltr\">Online Tech\u2019s Senior Product Architect Steve Aiello will be speaking on a panel discussion tomorrow, October 16, about network security:<\/p>\n<p dir=\"ltr\"><em><strong>Industry Expert Panel: Network Security<\/strong><\/em><br \/>\nRoom: Suite 3<br \/>\nTime: 1:15pm \u2013 2:15pm<br \/>\nDescription: Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure.<\/p>\n<p dir=\"ltr\">Watch Aiello\u2019s special video series on data encryption <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">here<\/a>, and watch his previously recorded <a href=\"https:\/\/otavawebsite.wpengine.com\/about\/events\/\">webinar series<\/a> on disaster recovery, data backup and business continuity.<\/p>\n<p dir=\"ltr\">Other key sessions on the agenda include:<\/p>\n<p><em><strong>Vendor Oversight: How to Perform a Vendor Security Due Diligence Review<\/strong><\/em><br \/>\nSpeaker: Dr. Faith Heikkila<br \/>\nRoom: Theater<br \/>\nTime: 8:30am &#8211; 9:15am<br \/>\nDescription: Vendors are an important part of any business, but there are inherent risks to assess and mitigate. \u00a0How do you evaluate the viability, security, and disaster recovery capabilities of a vendor? \u00a0Effective due diligence practices that assess, mitigate, or accept the risks associated with third party vendors will be discussed.<\/p>\n<p dir=\"ltr\">At Online Tech, our third-party audits are but one facet of our dedication to security and compliance for our clients and within our company. Another place to start when initially vetting a vendor\u2019s security due diligence is by asking a few simple questions. Check out the following guides to hosting security:<\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/www.onlinetech.com\/resources\/e-tips\/pci-compliance\/four-ways-to-gain-transparency-with-pci-hosting-providers\">Four Ways to Gain Transparency with PCI Hosting Providers<\/a><\/strong><\/em> &#8211; What are the top (and, in most cases, required) ways you can ensure you have complete visibility into your <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/pci-compliant-cloud\/\">PCI cloud hosting<\/a> provider\u2019s environment and not only achieve PCI compliance demands but also a peace of mind?<\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/five-questions-to-ask-your-hipaa-hosting-provider\/\">Five Questions to Ask Your HIPAA Hosting Provider<\/a><\/strong><\/em> &#8211; Hosting your critical data and applications with a provider requires trust and confidence in their ability to meet HIPAA compliance requirements. What questions should you, as covered entity, ask your <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA hosting provider<\/a>?<\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/what-to-look-for-in-a-hipaa-cloud-provider\/\">What to Look for in a HIPAA Cloud Provider<\/a> <\/strong><\/em>&#8211; Choosing a <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA compliant cloud<\/a> provider isn\u2019t simple in these times, and as a healthcare organization or SaaS company, you need to know the basics to ensure you\u2019re covered by September 23.<\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/five-questions-to-ask-your-disaster-recovery-provider\/\">Seeking a Disaster Recovery Solution? Five Questions to Ask Your DR Provider<\/a> <\/strong><\/em>&#8211; When you look to a third party <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/data-protection\/disaster-recovery-as-a-service\">disaster recovery provider<\/a>, what kind of questions should you ask to ensure your critical data and applications are safe? Read on for tips on what to look for in a disaster recovery as a service (DRaaS) solution from your hosting provider.<\/p>\n<p><em><strong>Compliance Convergence<\/strong><\/em><br \/>\nSpeaker: David Barton<br \/>\nRoom: 103<br \/>\nTime: 8:30am &#8211; 9:15am<br \/>\nDescription: Technology and security providers along with other service organizations are being bombarded with compliance demands from all quarters, including <a href=\"https:\/\/www.onlinetech.com\/compliant-hosting\/pci-compliant-hosting\/overview\">PCI<\/a>, <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/hipaa-compliant-cloud\/\">HIPAA<\/a>, Fedramp, ISO, and certainly by customers asking for <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SSAE 16<\/a> and\/or <a href=\"https:\/\/otavawebsite.wpengine.com\/compliance-security\/soc-1-2-3-compliant-cloud\/\">SOC 2<\/a> audits. Given all the demands, how are smart companies coping? This session will provide some insight into how some innovative companies have been working with their audit and compliance firms to \u201cnormalize\u201d the compliance process and reduce the impact of all these differing compliance standards. If you want to maximize your compliance and minimize your professional fees, you should attend this session.<\/p>\n<p dir=\"ltr\"><a href=\"https:\/\/otavawebsite.wpengine.com\/reference\/data-center-standards-cheat-sheet-from-hipaa-to-soc-2\/\">Data Center Standards Cheat Sheet &#8211; From HIPAA to SOC 2<\/a> &#8211; Compliance, audits, reports plus recent updates make for a confusing regulatory landscape. What are auditors, security-conscious organizations and vendors to do? Read our quick cheat sheet to see what each standard is used for and how it relates to your company.<\/p>\n<p><em><strong>Industry Expert Panel: Bring Your Own Device-BYOD<\/strong><\/em><br \/>\nRoom: Keynote Theater<br \/>\nTime: 1:15pm &#8211; 2:15pm<br \/>\nDescription: Companies have embraced the idea of the mobile worker. Smart phones, tablets, and laptops are now the norm in many organizations even if the official blessing has not been given by the security team. What new headaches does this create? What is being done to effectively secure these devices in the event of loss, intrusion, or the disgruntled employee? Our experts will tackle these questions and more on this panel.<\/p>\n<p dir=\"ltr\"><em><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/\">Mobile Security White Paper<\/a><\/strong><\/em> &#8211; This white paper explores approaches to mobile security from risk assessment (what data are truly at risk), enterprise architecture (protect the data before the devices), policies and technologies, and concludes with an example of a mobile security architecture designed and implemented within a hospital environment in which both enabling caregivers and protecting privacy, integrity, and confidentiality are paramount.<\/p>\n<p dir=\"ltr\">View the full Detroit SecureWorld agenda <a href=\"https:\/\/www.secureworldexpo.com\/detroit\/agenda\">here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Our online guides to information security (infosec) and compliance are scattered across our website and blog, but here\u2019s a roundup of our best and most relevant resources that relate to this year\u2019s Detroit SecureWorld security and compliance sessions, tomorrow and Thursday. Online Tech\u2019s Senior Product Architect Steve Aiello will be speaking on a panel discussion tomorrow, October 16, about network security: Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm \u2013 2:15pm Description: Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure. Watch Aiello\u2019s special video series on data encryption here, and watch his previously recorded webinar series on disaster recovery, data backup and business continuity. Other key sessions on the agenda include: Vendor Oversight: How to Perform a Vendor Security Due Diligence Review Speaker: Dr. Faith Heikkila Room: Theater Time: 8:30am &#8211; 9:15am Description: Vendors are an important part of&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2680","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Information Security: Your Complete Guides to Data Regulatory Compliance | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Information Security: Your Complete Guides to Data Regulatory Compliance\" \/>\n<meta property=\"og:description\" content=\"Our online guides to information security (infosec) and compliance are scattered across our website and blog, but here\u2019s a roundup of our best and most relevant resources that relate to this year\u2019s Detroit SecureWorld security and compliance sessions, tomorrow and Thursday. Online Tech\u2019s Senior Product Architect Steve Aiello will be speaking on a panel discussion tomorrow, October 16, about network security: Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm \u2013 2:15pm Description: Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure. Watch Aiello\u2019s special video series on data encryption here, and watch his previously recorded webinar series on disaster recovery, data backup and business continuity. Other key sessions on the agenda include: Vendor Oversight: How to Perform a Vendor Security Due Diligence Review Speaker: Dr. Faith Heikkila Room: Theater Time: 8:30am &#8211; 9:15am Description: Vendors are an important part of...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-15T00:00:00+00:00\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Information Security: Your Complete Guides to Data Regulatory Compliance\",\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\"},\"wordCount\":813,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\",\"url\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\",\"name\":\"Information Security: Your Complete Guides to Data Regulatory Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"datePublished\":\"2013-10-15T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Information Security: Your Complete Guides to Data Regulatory Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Information Security: Your Complete Guides to Data Regulatory Compliance | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/","og_locale":"en_US","og_type":"article","og_title":"Information Security: Your Complete Guides to Data Regulatory Compliance","og_description":"Our online guides to information security (infosec) and compliance are scattered across our website and blog, but here\u2019s a roundup of our best and most relevant resources that relate to this year\u2019s Detroit SecureWorld security and compliance sessions, tomorrow and Thursday. Online Tech\u2019s Senior Product Architect Steve Aiello will be speaking on a panel discussion tomorrow, October 16, about network security: Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm \u2013 2:15pm Description: Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure. Watch Aiello\u2019s special video series on data encryption here, and watch his previously recorded webinar series on disaster recovery, data backup and business continuity. Other key sessions on the agenda include: Vendor Oversight: How to Perform a Vendor Security Due Diligence Review Speaker: Dr. Faith Heikkila Room: Theater Time: 8:30am &#8211; 9:15am Description: Vendors are an important part of...","og_url":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/","og_site_name":"OTAVA","article_published_time":"2013-10-15T00:00:00+00:00","author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Information Security: Your Complete Guides to Data Regulatory Compliance","datePublished":"2013-10-15T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/"},"wordCount":813,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/","url":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/","name":"Information Security: Your Complete Guides to Data Regulatory Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"datePublished":"2013-10-15T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/information-security-your-complete-guides-to-data-regulatory-compliance\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Information Security: Your Complete Guides to Data Regulatory Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2680","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2680"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2680\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2680"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2680"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2680"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2680"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}