
{"id":2689,"date":"2013-10-22T00:00:00","date_gmt":"2013-10-22T00:00:00","guid":{"rendered":"http:\/\/otava.test\/is-data-less-secure-in-a-cloud-environment\/"},"modified":"2013-10-22T00:00:00","modified_gmt":"2013-10-22T00:00:00","slug":"is-data-less-secure-in-a-cloud-environment","status":"publish","type":"post","link":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/","title":{"rendered":"Video: Is Data Less Secure in a Cloud Environment?"},"content":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment.<\/p>\n<p>Actually &#8211; data is more secure with a\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">cloud hosting provider<\/a>.<\/p>\n<p>Does your office have the appropriate level of physical security in place, including:<\/p>\n<ul>\n<li>Biometric authentication &#8211; key fobs, pins and fingerprint readers for access to your servers<\/li>\n<li>Solid, reinforced concrete walls<\/li>\n<li>Heat and fire suppression sensors<\/li>\n<li>Additional locks on cabinets<\/li>\n<li>Visitor logs<\/li>\n<\/ul>\n<p>Does your limited technical staff have the ability to:<\/p>\n<ul>\n<li>Ensure your patches are up-to-date<\/li>\n<li>Expertise to run enterprise <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">antivirus<\/a>, anti-malware, <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/file-integrity-monitoring-fim\">file integrity monitoring<\/a> solution with IDS\/IPS solution<\/li>\n<li>Fully redundant, high availability firewall maintenance<\/li>\n<li>Expertise to implement <a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\/encryption\">encryption<\/a> in storage arrays<\/li>\n<li>Know-how to harden operating systems<\/li>\n<li>Ability to alert in case of anomalies<\/li>\n<li>Set up <a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">web application firewalls<\/a><\/li>\n<li>Set up and configure highly mobile VPNs in a cost-effective manner<\/li>\n<\/ul>\n<p>Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs.<\/p>\n<p><strong><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\">Watch the full video on our site.<\/a><\/strong><\/p>\n<figure style=\"width: 480px\" class=\"wp-caption alignnone\"><a href=\"https:\/\/otavawebsite.wpengine.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\"><img loading=\"lazy\" decoding=\"async\" class=\" \" title=\"Is Data Less Secure in a Cloud Environment?\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" alt=\"Is Data Less Secure in a Cloud Environment?\" width=\"480\" height=\"360\" \/><\/a><figcaption class=\"wp-caption-text\">Is Data Less Secure in a Cloud Environment? View video on our site.<\/figcaption><\/figure>\n<hr \/>\n<p>Learn more about encryption of data at rest and in transit on our\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud-security\/\">Defense in Depth<\/a>\u00a0page.<\/p>\n<p>The increased cyber threats of hackers and data theft presents a strong case for employing encryption and infrastructure that both secures data while delivering strong computing performance for optimal data availability and reliability. In this white paper, different types of encryption will be discussed, including using\u00a0<a href=\"https:\/\/otavawebsite.wpengine.com\/solutions\/cloud\/\">encryption in the cloud<\/a>.<\/p>\n<p><a href=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\"><img loading=\"lazy\" decoding=\"async\" class=\"alignright\" title=\"Encrypted Cloud Data\" src=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/encryptioncloud.png\" alt=\"Encrypted Cloud Data\" width=\"239\" height=\"186\" \/><\/a><\/p>\n<p>Although encryption is not a silver bullet of data or system security, it is one key tool that can be accompanied by a\u00a0<a href=\"https:\/\/www.onlinetech.com\/secure-hosting\/technical-security\">full arsenal of security services<\/a>\u00a0for a layered-defense approach to ensuring data is protected, even if accessed by unauthorized individuals. Additional security options to add to your IT solution will be covered.<\/p>\n<p>Download our latest white paper,<strong>\u00a0<em><a href=\"https:\/\/web.otava.com\/is-your-encryption-providing-the-right-protection\">Encryption of Cloud Data<\/a><\/em>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Actually &#8211; data is more secure with a\u00a0cloud hosting provider. Does your office have the appropriate level of physical security in place, including: Biometric authentication &#8211; key fobs, pins and fingerprint readers for access to your servers Solid, reinforced concrete walls Heat and fire suppression sensors Additional locks on cabinets Visitor logs Does your limited technical staff have the ability to: Ensure your patches are up-to-date Expertise to run enterprise antivirus, anti-malware, file integrity monitoring solution with IDS\/IPS solution Fully redundant, high availability firewall maintenance Expertise to implement encryption in storage arrays Know-how to harden operating systems Ability to alert in case of anomalies Set up web application firewalls Set up and configure highly mobile VPNs in a cost-effective manner Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs. Watch the full video on our site. Learn more about encryption of data at rest&#8230;<\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[1],"tags":[],"other_category":[],"class_list":["post-2689","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.2 (Yoast SEO v27.2) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Video: Is Data Less Secure in a Cloud Environment? | OTAVA<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Video: Is Data Less Secure in a Cloud Environment?\" \/>\n<meta property=\"og:description\" content=\"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Actually &#8211; data is more secure with a\u00a0cloud hosting provider. Does your office have the appropriate level of physical security in place, including: Biometric authentication &#8211; key fobs, pins and fingerprint readers for access to your servers Solid, reinforced concrete walls Heat and fire suppression sensors Additional locks on cabinets Visitor logs Does your limited technical staff have the ability to: Ensure your patches are up-to-date Expertise to run enterprise antivirus, anti-malware, file integrity monitoring solution with IDS\/IPS solution Fully redundant, high availability firewall maintenance Expertise to implement encryption in storage arrays Know-how to harden operating systems Ability to alert in case of anomalies Set up web application firewalls Set up and configure highly mobile VPNs in a cost-effective manner Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs. Watch the full video on our site. Learn more about encryption of data at rest...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\" \/>\n<meta property=\"og:site_name\" content=\"OTAVA\" \/>\n<meta property=\"article:published_time\" content=\"2013-10-22T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\" \/>\n<meta name=\"author\" content=\"Irma Brillantes\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Irma Brillantes\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\"},\"author\":{\"name\":\"Irma Brillantes\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\"},\"headline\":\"Video: Is Data Less Secure in a Cloud Environment?\",\"datePublished\":\"2013-10-22T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\"},\"wordCount\":354,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\",\"url\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\",\"name\":\"Video: Is Data Less Secure in a Cloud Environment? | OTAVA\",\"isPartOf\":{\"@id\":\"https:\/\/www.otava.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"datePublished\":\"2013-10-22T00:00:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage\",\"url\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\",\"contentUrl\":\"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.otava.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Video: Is Data Less Secure in a Cloud Environment?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.otava.com\/#website\",\"url\":\"https:\/\/www.otava.com\/\",\"name\":\"OTAVA\u00ae\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.otava.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.otava.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.otava.com\/#organization\",\"name\":\"OTAVA\u00ae\",\"url\":\"https:\/\/www.otava.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"contentUrl\":\"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg\",\"caption\":\"OTAVA\u00ae\"},\"image\":{\"@id\":\"https:\/\/www.otava.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263\",\"name\":\"Irma Brillantes\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g\",\"caption\":\"Irma Brillantes\"},\"url\":\"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Video: Is Data Less Secure in a Cloud Environment? | OTAVA","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/","og_locale":"en_US","og_type":"article","og_title":"Video: Is Data Less Secure in a Cloud Environment?","og_description":"Online Tech&#8217;s Senior Product Architect Steve Aiello continues his data security series of videos on data encryption by dispelling the myth that data is less secure in a well-run data center or in a cloud environment. Actually &#8211; data is more secure with a\u00a0cloud hosting provider. Does your office have the appropriate level of physical security in place, including: Biometric authentication &#8211; key fobs, pins and fingerprint readers for access to your servers Solid, reinforced concrete walls Heat and fire suppression sensors Additional locks on cabinets Visitor logs Does your limited technical staff have the ability to: Ensure your patches are up-to-date Expertise to run enterprise antivirus, anti-malware, file integrity monitoring solution with IDS\/IPS solution Fully redundant, high availability firewall maintenance Expertise to implement encryption in storage arrays Know-how to harden operating systems Ability to alert in case of anomalies Set up web application firewalls Set up and configure highly mobile VPNs in a cost-effective manner Comparing the services of cloud service providers to the man-hours and hardware required for a in-house solution, a cloud hosting provider offers more value and expertise at lower costs. Watch the full video on our site. Learn more about encryption of data at rest...","og_url":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/","og_site_name":"OTAVA","article_published_time":"2013-10-22T00:00:00+00:00","og_image":[{"url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","type":"","width":"","height":""}],"author":"Irma Brillantes","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Irma Brillantes","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#article","isPartOf":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/"},"author":{"name":"Irma Brillantes","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263"},"headline":"Video: Is Data Less Secure in a Cloud Environment?","datePublished":"2013-10-22T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/"},"wordCount":354,"commentCount":0,"publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"image":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/","url":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/","name":"Video: Is Data Less Secure in a Cloud Environment? | OTAVA","isPartOf":{"@id":"https:\/\/www.otava.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage"},"image":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage"},"thumbnailUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","datePublished":"2013-10-22T00:00:00+00:00","breadcrumb":{"@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#primaryimage","url":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg","contentUrl":"https:\/\/otava.test\/wp-content\/uploads\/2019\/04\/0.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.otava.com\/blog\/is-data-less-secure-in-a-cloud-environment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.otava.com\/"},{"@type":"ListItem","position":2,"name":"Video: Is Data Less Secure in a Cloud Environment?"}]},{"@type":"WebSite","@id":"https:\/\/www.otava.com\/#website","url":"https:\/\/www.otava.com\/","name":"OTAVA\u00ae","description":"","publisher":{"@id":"https:\/\/www.otava.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.otava.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.otava.com\/#organization","name":"OTAVA\u00ae","url":"https:\/\/www.otava.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","contentUrl":"https:\/\/www.otava.com\/wp-content\/uploads\/2025\/03\/otava-logo.svg","caption":"OTAVA\u00ae"},"image":{"@id":"https:\/\/www.otava.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.otava.com\/#\/schema\/person\/35774075f8f4fcdd4eae80cb72034263","name":"Irma Brillantes","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d5251bebc1699793a698d1a6158603cb3cdc50a095a12357e42d415b3e5546c2?s=96&d=mm&r=g","caption":"Irma Brillantes"},"url":"https:\/\/www.otava.com\/blog\/author\/ibrillantesotava-com\/"}]}},"_links":{"self":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2689","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/comments?post=2689"}],"version-history":[{"count":0,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/posts\/2689\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/media?parent=2689"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/categories?post=2689"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/tags?post=2689"},{"taxonomy":"other_category","embeddable":true,"href":"https:\/\/www.otava.com\/wp-json\/wp\/v2\/other_category?post=2689"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}