
{"id":2683,"date":"2013-10-16T00:00:00","date_gmt":"2013-10-16T00:00:00","guid":{"rendered":"http:\/\/otava.test\/how-to-make-encryption-easier-to-implement-best-practices-video\/"},"modified":"2013-10-16T00:00:00","modified_gmt":"2013-10-16T00:00:00","slug":"how-to-make-encryption-easier-to-implement-best-practices-video","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/","title":{"rendered":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective.<\/p>\n<p>How can you make encryption easier to implement?<\/p>\n<ul>\n<li>Use high-end technology products<\/li>\n<li>Partner with a provider that understands encryption<\/li>\n<\/ul>\n<p>One example is Online Tech&#8217;s <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encrypted cloud<\/a> solution that uses EMC VMAX storage (SAN).<\/p>\n<p>If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption.<\/p>\n<p>Another service we provide is\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">SSL certificates<\/a>,\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">two-factor authentication<\/a>\u00a0and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application.<\/p>\n<p><strong><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/how-to-make-encryption-easier-to-implement\">Watch the full video on our site.<\/a><\/strong><\/p>\n<p>View other videos in the data encryption series\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/about\/resources\/videos\/\">here<\/a>, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the\u00a0<a href=\"https:\/\/www.onlinetech.com\/events\/detroit-secureworld-2013\">Detroit SecureWorld Expo<\/a>\u00a0(today!):<\/p>\n<p><em><strong>Industry Expert Panel: Network Security<\/strong><\/em><br \/>\nRoom: Suite 3<br \/>\nTime: 1:15pm &#8211; 2:15pm<br \/>\nDescription:\u00a0Network Security is defined as, \u201cthe protection of a computer network and its services from unauthorized modification, destruction or disclosure.\u201d Cyber security professionals are tasked with keeping up with new threats to the network while maintaining efficient workflow and access to information. This panel discussion aims to explore current issues being raised in the area of Network Security and solutions available to make the network more secure.<\/p>\n<figure style=\"width: 480px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/www.onlinetech.com\/resources\/wiki\/encryption-wiki\/how-to-make-encryption-easier-to-implement\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"What is a Virtual Private Network? View video on our site.\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" alt=\"What is a Virtual Private Network? View video on our site.\" width=\"480\" height=\"360\" \/><\/a><figcaption class=\"wp-caption-text\">What is a Virtual Private Network? View video on our site.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a>\u00a0page.<\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective. How can you make encryption easier to implement? Use high-end technology products Partner with a provider that understands encryption One example is Online Tech&#8217;s encrypted cloud solution that uses EMC VMAX storage (SAN). If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption. Another service we provide is\u00a0SSL certificates,\u00a0two-factor authentication\u00a0and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application. Watch the full video on our site. View other videos in the data encryption series\u00a0here, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the\u00a0Detroit SecureWorld Expo\u00a0(today!): Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm &#8211; 2:15pm Description:\u00a0Network Security is defined as, \u201cthe protection of a computer network&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2683","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective. How can you make encryption easier to implement? Use high-end technology products Partner with a provider that understands encryption One example is Online Tech&#8217;s encrypted cloud solution that uses EMC VMAX storage (SAN). If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption. Another service we provide is\u00a0SSL certificates,\u00a0two-factor authentication\u00a0and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application. Watch the full video on our site. View other videos in the data encryption series\u00a0here, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the\u00a0Detroit SecureWorld Expo\u00a0(today!): Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm &#8211; 2:15pm Description:\u00a0Network Security is defined as, \u201cthe protection of a computer network...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-16T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance\",\"datePublished\":\"2013-10-16T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\"},\"wordCount\":423,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\",\"url\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\",\"name\":\"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"datePublished\":\"2013-10-16T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/","og_locale":"en_US","og_type":"article","og_title":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by walking through the steps that will make implementing data encryption for your business easier and more cost-effective. How can you make encryption easier to implement? Use high-end technology products Partner with a provider that understands encryption One example is Online Tech&#8217;s encrypted cloud solution that uses EMC VMAX storage (SAN). If you have a virtual private server, when your data hits our storage array, it is written to hard drive and is encrypted. Using AES 256-bit, your data can meet compliance requirements for encryption. Another service we provide is\u00a0SSL certificates,\u00a0two-factor authentication\u00a0and VPN. These layers of security provide encrypted data at rest and encrypted mobile VPN. An additional step is to select a vendor for their software that builds encryption into their software application. Watch the full video on our site. View other videos in the data encryption series\u00a0here, and check back as we continue to update! Aiello will also be speaking on a panel discussion at the\u00a0Detroit SecureWorld Expo\u00a0(today!): Industry Expert Panel: Network Security Room: Suite 3 Time: 1:15pm &#8211; 2:15pm Description:\u00a0Network Security is defined as, \u201cthe protection of a computer network...","og_url":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/","og_site_name":"OTAVA","article_published_time":"2013-10-16T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance","datePublished":"2013-10-16T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/"},"wordCount":423,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/","url":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/","name":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","datePublished":"2013-10-16T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/how-to-make-encryption-easier-to-implement-best-practices-video\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Making Cloud Encryption Easy to Implement for HIPAA and PCI Compliance"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2683"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2683\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2683"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}