{"id":5326,"date":"2024-11-23T23:21:00","date_gmt":"2024-11-24T07:21:00","guid":{"rendered":"https:\/\/myblogd.com\/?p=5326"},"modified":"2024-11-23T23:21:00","modified_gmt":"2024-11-24T07:21:00","slug":"what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests","status":"publish","type":"post","link":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/","title":{"rendered":"WHAT EXACTLY IS MEANT BY THE PHRASE &#8220;PENETRATION TESTING,&#8221; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS?"},"content":{"rendered":"<p>It would seem that companies are now more susceptible to the possibility of data breaches and information leaks than they have ever been in the past. According to the results of a survey conducted by the government and published in June of the previous year on information security breaches, an astounding ninety percent of large organizations in the United Kingdom that participated in the survey and reported a security breach of some kind in 2015, as did seventy-four percent of small and medium-sized businesses. Because cybercriminals are growing more adept at breaking into the infrastructure of an organization and gaining access to vital information, it is of the utmost significance to maintain control over your own company&#8217;s security. The thorough penetration testing service provided by sec-tec can help firms locate weak points in their infrastructure and expose vulnerabilities. From that point on, we will be able to aid with the correction of faults that have been detected and the protection of the firm in question from cyberattacks. a risk-free method of identifying points of weakness Penetration testing is a simulation of a cyber-attack, but it does not steal or otherwise compromise any of the information belonging to an organization. The procedure starts with an examination of any accessible public information sources that might potentially have a negative impact on the security of a firm, and then it moves on to a technical evaluation of the security measures that are in place at an organization. After a vulnerability has been discovered, it will be reported, and the procedure will then be repeated in order to compile a list of attack sites included inside the system. Several distinct approaches may be used, including the following: Testing in a &#8220;white box&#8221; environment gives the testing team information about the system being tested. This is offered in order to cut down on the amount of time and money required for the total project. &#8220;black box&#8221; testing does not supply the testing team with any more information beyond what is already accessible to the general public. Each one is beneficial in some way. In its most basic form, a pentesting exam will pinpoint the vulnerabilities in a company&#8217;s network security that an attacker may exploit in the near or distant future. If you can uncover the vulnerabilities in the infrastructure of your company before an adversarial hacker does, you will be able to patch those flaws and protect your company from potential damage. Using sec-penetration tec&#8217;s testing, does your organization&#8217;s infrastructure remain secure? Penetration testing services provided by sec-tec include complete security evaluations of every digital part of your company, including its infrastructure, online applications, wireless network, and even desktop security. Visit our website to learn more about the many security checks that we are able to carry out for your company, or get in touch with us via email or the phone to have a more in-depth conversation about the precise security needs of your organization.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It would seem that companies are now more susceptible to the possibility of data breaches and information leaks than they have ever been in the past. According to the results of a survey conducted by the government and published in June of the previous year on information security breaches, an astounding ninety percent of large organizations in the United Kingdom that participated in the survey and reported a security breach of some kind in 2015, as did seventy-four percent of small and medium-sized businesses. Because cybercriminals are growing more adept at breaking into the infrastructure of an organization and gaining access to vital information, it is of the utmost significance to maintain control over your own company&#8217;s security. The thorough penetration testing service provided by sec-tec can help firms locate weak points in their infrastructure and expose vulnerabilities. From that point on, we will be able to aid with the correction of faults that have been detected and the protection of the firm in question from cyberattacks. a risk-free method of identifying points of weakness Penetration testing is a simulation of a cyber-attack, but it does not steal or otherwise compromise any of the information belonging to an organization. The procedure starts with an examination of any accessible public information sources that might potentially have a negative impact on the security of a firm, and then it moves on to a technical evaluation of the security measures that are in place at an organization. After a vulnerability has been discovered, it will be reported, and the procedure will then be repeated in order to compile a list of attack sites included inside the system. Several distinct approaches may be used, including the following: Testing in a &#8220;white box&#8221; environment gives the testing team information about the system being tested. This is offered in order to cut down on the amount of time and money required for the total project. &#8220;black box&#8221; testing does not supply the testing team with any more information beyond what is already accessible to the general public. Each one is beneficial in some way. In its most basic form, a pentesting exam will pinpoint the vulnerabilities in a company&#8217;s network security that an attacker may exploit in the near or distant future. If you can uncover the vulnerabilities in the infrastructure of your company before an adversarial hacker does, you will be able to patch those flaws and protect your company from potential damage. Using sec-penetration tec&#8217;s testing, does your organization&#8217;s infrastructure remain secure? Penetration testing services provided by sec-tec include complete security evaluations of every digital part of your company, including its infrastructure, online applications, wireless network, and even desktop security. Visit our website to learn more about the many security checks that we are able to carry out for your company, or get in touch with us via email or the phone to have a more in-depth conversation about the precise security needs of your organization.<\/p>\n","protected":false},"author":14,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[81],"tags":[121],"class_list":["post-5326","post","type-post","status-publish","format-standard","hentry","category-press-release","tag-press-release"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>WHAT EXACTLY IS MEANT BY THE PHRASE &quot;PENETRATION TESTING,&quot; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising<\/title>\n<meta name=\"robots\" content=\"noindex, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"WHAT EXACTLY IS MEANT BY THE PHRASE &quot;PENETRATION TESTING,&quot; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising\" \/>\n<meta property=\"og:description\" content=\"It would seem that companies are now more susceptible to the possibility of data breaches and information leaks than they have ever been in the past. According to the results of a survey conducted by the government and published in June of the previous year on information security breaches, an astounding ninety percent of large organizations in the United Kingdom that participated in the survey and reported a security breach of some kind in 2015, as did seventy-four percent of small and medium-sized businesses. Because cybercriminals are growing more adept at breaking into the infrastructure of an organization and gaining access to vital information, it is of the utmost significance to maintain control over your own company&#8217;s security. The thorough penetration testing service provided by sec-tec can help firms locate weak points in their infrastructure and expose vulnerabilities. From that point on, we will be able to aid with the correction of faults that have been detected and the protection of the firm in question from cyberattacks. a risk-free method of identifying points of weakness Penetration testing is a simulation of a cyber-attack, but it does not steal or otherwise compromise any of the information belonging to an organization. The procedure starts with an examination of any accessible public information sources that might potentially have a negative impact on the security of a firm, and then it moves on to a technical evaluation of the security measures that are in place at an organization. After a vulnerability has been discovered, it will be reported, and the procedure will then be repeated in order to compile a list of attack sites included inside the system. Several distinct approaches may be used, including the following: Testing in a &#8220;white box&#8221; environment gives the testing team information about the system being tested. This is offered in order to cut down on the amount of time and money required for the total project. &#8220;black box&#8221; testing does not supply the testing team with any more information beyond what is already accessible to the general public. Each one is beneficial in some way. In its most basic form, a pentesting exam will pinpoint the vulnerabilities in a company&#8217;s network security that an attacker may exploit in the near or distant future. If you can uncover the vulnerabilities in the infrastructure of your company before an adversarial hacker does, you will be able to patch those flaws and protect your company from potential damage. Using sec-penetration tec&#8217;s testing, does your organization&#8217;s infrastructure remain secure? Penetration testing services provided by sec-tec include complete security evaluations of every digital part of your company, including its infrastructure, online applications, wireless network, and even desktop security. Visit our website to learn more about the many security checks that we are able to carry out for your company, or get in touch with us via email or the phone to have a more in-depth conversation about the precise security needs of your organization.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/\" \/>\n<meta property=\"og:site_name\" content=\"myBlogd - Free Publishing and Advertising\" \/>\n<meta property=\"article:published_time\" content=\"2024-11-24T07:21:00+00:00\" \/>\n<meta name=\"author\" content=\"KentuckyCryingChicken\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"KentuckyCryingChicken\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/\"},\"author\":{\"name\":\"KentuckyCryingChicken\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/fc4be98de527a5cb43b74847c86a46d6\"},\"headline\":\"WHAT EXACTLY IS MEANT BY THE PHRASE &#8220;PENETRATION TESTING,&#8221; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS?\",\"datePublished\":\"2024-11-24T07:21:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/\"},\"wordCount\":516,\"commentCount\":0,\"keywords\":[\"Press Release\"],\"articleSection\":[\"Press Release\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/\",\"url\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/\",\"name\":\"WHAT EXACTLY IS MEANT BY THE PHRASE \\\"PENETRATION TESTING,\\\" AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/#website\"},\"datePublished\":\"2024-11-24T07:21:00+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/fc4be98de527a5cb43b74847c86a46d6\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/2024\\\/11\\\/23\\\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/myblogd.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"WHAT EXACTLY IS MEANT BY THE PHRASE &#8220;PENETRATION TESTING,&#8221; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#website\",\"url\":\"https:\\\/\\\/myblogd.com\\\/\",\"name\":\"myBlogd - Free Publishing and Advertising\",\"description\":\"Free Publishing and Advertising\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/myblogd.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/myblogd.com\\\/#\\\/schema\\\/person\\\/fc4be98de527a5cb43b74847c86a46d6\",\"name\":\"KentuckyCryingChicken\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g\",\"caption\":\"KentuckyCryingChicken\"},\"sameAs\":[\"https:\\\/\\\/myblogd.com\"],\"url\":\"https:\\\/\\\/myblogd.com\\\/index.php\\\/author\\\/kentuckycryingchicken\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"WHAT EXACTLY IS MEANT BY THE PHRASE \"PENETRATION TESTING,\" AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising","robots":{"index":"noindex","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"WHAT EXACTLY IS MEANT BY THE PHRASE \"PENETRATION TESTING,\" AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising","og_description":"It would seem that companies are now more susceptible to the possibility of data breaches and information leaks than they have ever been in the past. According to the results of a survey conducted by the government and published in June of the previous year on information security breaches, an astounding ninety percent of large organizations in the United Kingdom that participated in the survey and reported a security breach of some kind in 2015, as did seventy-four percent of small and medium-sized businesses. Because cybercriminals are growing more adept at breaking into the infrastructure of an organization and gaining access to vital information, it is of the utmost significance to maintain control over your own company&#8217;s security. The thorough penetration testing service provided by sec-tec can help firms locate weak points in their infrastructure and expose vulnerabilities. From that point on, we will be able to aid with the correction of faults that have been detected and the protection of the firm in question from cyberattacks. a risk-free method of identifying points of weakness Penetration testing is a simulation of a cyber-attack, but it does not steal or otherwise compromise any of the information belonging to an organization. The procedure starts with an examination of any accessible public information sources that might potentially have a negative impact on the security of a firm, and then it moves on to a technical evaluation of the security measures that are in place at an organization. After a vulnerability has been discovered, it will be reported, and the procedure will then be repeated in order to compile a list of attack sites included inside the system. Several distinct approaches may be used, including the following: Testing in a &#8220;white box&#8221; environment gives the testing team information about the system being tested. This is offered in order to cut down on the amount of time and money required for the total project. &#8220;black box&#8221; testing does not supply the testing team with any more information beyond what is already accessible to the general public. Each one is beneficial in some way. In its most basic form, a pentesting exam will pinpoint the vulnerabilities in a company&#8217;s network security that an attacker may exploit in the near or distant future. If you can uncover the vulnerabilities in the infrastructure of your company before an adversarial hacker does, you will be able to patch those flaws and protect your company from potential damage. Using sec-penetration tec&#8217;s testing, does your organization&#8217;s infrastructure remain secure? Penetration testing services provided by sec-tec include complete security evaluations of every digital part of your company, including its infrastructure, online applications, wireless network, and even desktop security. Visit our website to learn more about the many security checks that we are able to carry out for your company, or get in touch with us via email or the phone to have a more in-depth conversation about the precise security needs of your organization.","og_url":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/","og_site_name":"myBlogd - Free Publishing and Advertising","article_published_time":"2024-11-24T07:21:00+00:00","author":"KentuckyCryingChicken","twitter_card":"summary_large_image","twitter_misc":{"Written by":"KentuckyCryingChicken","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/#article","isPartOf":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/"},"author":{"name":"KentuckyCryingChicken","@id":"https:\/\/myblogd.com\/#\/schema\/person\/fc4be98de527a5cb43b74847c86a46d6"},"headline":"WHAT EXACTLY IS MEANT BY THE PHRASE &#8220;PENETRATION TESTING,&#8221; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS?","datePublished":"2024-11-24T07:21:00+00:00","mainEntityOfPage":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/"},"wordCount":516,"commentCount":0,"keywords":["Press Release"],"articleSection":["Press Release"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/","url":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/","name":"WHAT EXACTLY IS MEANT BY THE PHRASE \"PENETRATION TESTING,\" AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS? - myBlogd - Free Publishing and Advertising","isPartOf":{"@id":"https:\/\/myblogd.com\/#website"},"datePublished":"2024-11-24T07:21:00+00:00","author":{"@id":"https:\/\/myblogd.com\/#\/schema\/person\/fc4be98de527a5cb43b74847c86a46d6"},"breadcrumb":{"@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/myblogd.com\/index.php\/2024\/11\/23\/what-exactly-is-meant-by-the-phrase-penetration-testing-and-why-is-it-necessary-for-every-business-to-perform-such-tests\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/myblogd.com\/"},{"@type":"ListItem","position":2,"name":"WHAT EXACTLY IS MEANT BY THE PHRASE &#8220;PENETRATION TESTING,&#8221; AND WHY IS IT NECESSARY FOR EVERY BUSINESS TO PERFORM SUCH TESTS?"}]},{"@type":"WebSite","@id":"https:\/\/myblogd.com\/#website","url":"https:\/\/myblogd.com\/","name":"myBlogd - Free Publishing and Advertising","description":"Free Publishing and Advertising","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/myblogd.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/myblogd.com\/#\/schema\/person\/fc4be98de527a5cb43b74847c86a46d6","name":"KentuckyCryingChicken","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d44be44ba494c1405c9fa916c96bedf5aba1ff6c125ad64d9261ab4d60ba9aed?s=96&d=wavatar&r=g","caption":"KentuckyCryingChicken"},"sameAs":["https:\/\/myblogd.com"],"url":"https:\/\/myblogd.com\/index.php\/author\/kentuckycryingchicken\/"}]}},"_links":{"self":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/5326","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/users\/14"}],"replies":[{"embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/comments?post=5326"}],"version-history":[{"count":1,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/5326\/revisions"}],"predecessor-version":[{"id":35385,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/posts\/5326\/revisions\/35385"}],"wp:attachment":[{"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/media?parent=5326"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/categories?post=5326"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/myblogd.com\/index.php\/wp-json\/wp\/v2\/tags?post=5326"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}