{"id":11,"date":"2018-11-06T15:26:04","date_gmt":"2018-11-06T15:26:04","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=11"},"modified":"2025-04-28T12:32:43","modified_gmt":"2025-04-28T12:32:43","slug":"5-ridiculous-but-real-reasons-iot-security-is-critical","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/","title":{"rendered":"5 Ridiculous (But Real) Reasons IoT Security is Critical"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">&#8220;Why would I need a digital certificate for my toaster?&#8221; Let us tell you.<\/h2>\n\n\n\n<p>The Internet of Things (IoT) is growing exponentially. Each day more and more devices are coming online, which opens up new attack vectors for enterprising hackers and cybercriminals. On its face it might sound silly that you need to secure your thermostat or a FitBit. You would be wrong.<\/p>\n\n\n\n<p>Let\u2019s examine the FitBit example, using geolocational metadata foreign intelligence services were able to locate several US black sites thanks to the routes the soldier were taking while they jogged around the perimeters of the camps.<\/p>\n\n\n\n<p>Granted, most IoT exploits don\u2019t have the potential to be a matter of life or death like compromising the location of a black site would, but that doesn\u2019t mean the threat shouldn\u2019t be taken seriously.<\/p>\n\n\n\n<p>Here are five ridiculous (but real) reasons why IoT security is critical in 2018.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Your IoT devices can tell people a lot about you and your property<\/h3>\n\n\n\n<div class=\"wp-block-image wp-image-17 size-medium\"><figure class=\"alignright\"><img loading=\"lazy\" decoding=\"async\" width=\"300\" height=\"218\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/driving-map-300x218.png\" alt=\"iot devices and location tracking\" class=\"wp-image-17\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/driving-map-300x218.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/driving-map-560x407.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/driving-map.png 653w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/><figcaption>Many of your IoT devices (your car, your activity tracker, etc.) keep data on where you are and what you&#8217;re doing.<\/figcaption><\/figure><\/div>\n\n\n\n<p>This ultimately comes down to privacy, most IoT devices need to make contact with an application server somewhere at regular intervals, in addition to possibly reaching other endpoints. And vice versa. You need those connections to be secure or else the device will be transmitting everything in plaintext and it would be trivially simple to eavesdrop on those connections.<\/p>\n\n\n\n<p>You may be asking, \u201cyeah but what is somebody going to learn from my thermostat and smart lights?\u201d<\/p>\n\n\n\n<p>How about whether you\u2019re home. The more unsecured devices you have, the more data points an attacker has. Think about how much information could be harvested from eavesdropping on connections with your car, your smart home, anything that\u2019s online.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Quantum physics, man<\/h3>\n\n\n\n<p>Quantum computing is still about 8-10 years from being truly viable. But it\u2019s going to arrive before a lot of these devices have finished their lifecycles. So not only do you need a digital certificate for your IoT devices now, but you also need one that\u2019s going to be quantum-proof when the technology finally matures in about a decade.<\/p>\n\n\n\n<p>Typically, that comes in the form of digital certificates that are underpinned by two algorithms, a modern algorithm like RSA and a quantum-proof algorithm for down the road. This is going to be important because quantum computers will be able to crack RSA encryption easily and that\u2019s going to render most current IoT certificates obsolete. So, it\u2019s not just about having a digital certificate \u2013 preferably one with a long validity period \u2013 on your IoT devices. You need the right one. One that will withstand the inevitable threat of quantum computing.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Because eventually, the IoT is going to rise up and kill someone<\/h3>\n\n\n\n<p>While it\u2019s unlikely to be a Skynet-level rebellion, as more and more critical systems come online\u2014the stakes continue to rise. Not even ten years ago, the US and Israel \u201callegedly\u201d collaborated on the Stuxnet virus, which physically overheated Iranian nuclear centrifuges as part of a campaign to stunt its nuclear ambitions. Recently there have been attacks on power grids and other physical infrastructure that are connective.<\/p>\n\n\n\n<p>It\u2019s only a matter of time before a connected device is hacked with lethal repercussions. The best way to stave off this reality a little longer is with strong security for our IoT devices\u2014at least off the assembly line. While there\u2019s no accounting for what kinds of threats and attacks will present themselves in the future, there\u2019s no excuse for not manufacturing them to be optimally secure in the now. Unfortunately, not all manufacturers adhere to this mindset, so sometimes an aftermarket fix needs to be applied. Either way, we can\u2019t afford to leave these devices unsecured.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">These devices will have long lifespans<\/h3>\n\n\n\n<p>While we swap out our phones at regular intervals, other IoT devices could be in service for years to come. People don\u2019t swap out their refrigerators and thermostats quite as frequently. That means that these devices need to be fully secured for now, and with as much as much of an eye toward the future as possible.<\/p>\n\n\n\n<p>As we discussed earlier, part of that is accounting for the incoming quantum threat. But there are other considerations that need to be made too. Strong configurations that only support the latest algorithms and protocols are a must, as is having a mechanism to potentially make updates to these devices down the line. The latter isn\u2019t always feasible given that some vendors are loathe to include that kind of functionality in their devices, but if it\u2019s available make use of it.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Because your devices could be working for someone else<\/h3>\n\n\n\n<p>You wouldn\u2019t let someone come into your house and exploit your family\u2019s labor for their own profit, so why would you want that to happen to your appliances and devices? People wonder what a hacker would want with their IoT devices \u2013 it\u2019s their computing power. No, the ability to make ice isn\u2019t all that attractive to cyber criminals, but the processing power that can be harnessed as part of a botnet.<\/p>\n\n\n\n<p>Cybercriminals hack thousands of devices and build a botnet of devices they can control with a few clicks. This gives them the power to:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Launch DDoS attacks against websites and computer systems<\/li><li>Hack other computers while making it look like the hacker was at your house<\/li><li>Mine cryptocurrency to make money<\/li><li>Hide their identity by routing messages and internet traffic through the botnet<\/li><\/ul>\n\n\n\n<p>Build a botnet big enough, and you have a chance to make some decent revenue in cryptocurrency. This is not what you purchased these devices for. While this activity, called cryptojacking, may not result in latency that is THAT noticeable, it\u2019s still an invasion and unauthorized use of your device. Don\u2019t walk into your kitchen and have to ask, &#8220;are you mining bitcoin again, refrigerator?&#8221;<\/p>\n\n\n\n<p>&#8220;\u2026yes.&#8221;<\/p>\n\n\n\n<p>&#8220;What have I told you about that?&#8221;<\/p>\n\n\n\n<p>It might sound crazy, but IoT security is hardly a joke.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;Why would I need a digital certificate for my toaster?&#8221; Let us tell you. The Internet of Things (IoT) is growing exponentially. Each day more and more devices are coming&#8230;<\/p>\n","protected":false},"author":2,"featured_media":15,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-11","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-iot","post-without-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>5 Ridiculous (But Real) Reasons IoT Security is Critical<\/title>\n<meta name=\"description\" content=\"Let&#039;s discuss on IoT Security, why it&#039;s critical for your Home Device&#039;s security. IoT is expanding, and It&#039;s fair to think about IoT Security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"5 Ridiculous (But Real) Reasons IoT Security is Critical\" \/>\n<meta property=\"og:description\" content=\"Let&#039;s discuss on IoT Security, why it&#039;s critical for your Home Device&#039;s security. IoT is expanding, and It&#039;s fair to think about IoT Security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-06T15:26:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-28T12:32:43+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"900\" \/>\n\t<meta property=\"og:image:height\" content=\"585\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Adam Thompson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Adam Thompson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/\"},\"author\":{\"name\":\"Adam Thompson\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/9c03cf290f2c4d018d113632b853c80c\"},\"headline\":\"5 Ridiculous (But Real) Reasons IoT Security is Critical\",\"datePublished\":\"2018-11-06T15:26:04+00:00\",\"dateModified\":\"2025-04-28T12:32:43+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/\"},\"wordCount\":1030,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/iot-road.jpg\",\"articleSection\":[\"IoT\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/\",\"name\":\"5 Ridiculous (But Real) Reasons IoT Security is Critical\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/iot-road.jpg\",\"datePublished\":\"2018-11-06T15:26:04+00:00\",\"dateModified\":\"2025-04-28T12:32:43+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/9c03cf290f2c4d018d113632b853c80c\"},\"description\":\"Let's discuss on IoT Security, why it's critical for your Home Device's security. IoT is expanding, and It's fair to think about IoT Security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/iot-road.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/iot-road.jpg\",\"width\":900,\"height\":585,\"caption\":\"IoT\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/5-ridiculous-but-real-reasons-iot-security-is-critical\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"5 Ridiculous (But Real) Reasons IoT Security is Critical\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/9c03cf290f2c4d018d113632b853c80c\",\"name\":\"Adam Thompson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g\",\"caption\":\"Adam Thompson\"},\"description\":\"Adam has 16 years of experience in ecommerce and digital technology. He writes on digital strategy and cybersecurity for industry publications including InfoSec Insights, Ryte Magazine, Search Engine Journal, and Moz.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"5 Ridiculous (But Real) Reasons IoT Security is Critical","description":"Let's discuss on IoT Security, why it's critical for your Home Device's security. IoT is expanding, and It's fair to think about IoT Security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/","og_locale":"en_US","og_type":"article","og_title":"5 Ridiculous (But Real) Reasons IoT Security is Critical","og_description":"Let's discuss on IoT Security, why it's critical for your Home Device's security. IoT is expanding, and It's fair to think about IoT Security.","og_url":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/","og_site_name":"InfoSec Insights","article_published_time":"2018-11-06T15:26:04+00:00","article_modified_time":"2025-04-28T12:32:43+00:00","og_image":[{"width":900,"height":585,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg","type":"image\/jpeg"}],"author":"Adam Thompson","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Adam Thompson","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/"},"author":{"name":"Adam Thompson","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/9c03cf290f2c4d018d113632b853c80c"},"headline":"5 Ridiculous (But Real) Reasons IoT Security is Critical","datePublished":"2018-11-06T15:26:04+00:00","dateModified":"2025-04-28T12:32:43+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/"},"wordCount":1030,"image":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg","articleSection":["IoT"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/","url":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/","name":"5 Ridiculous (But Real) Reasons IoT Security is Critical","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg","datePublished":"2018-11-06T15:26:04+00:00","dateModified":"2025-04-28T12:32:43+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/9c03cf290f2c4d018d113632b853c80c"},"description":"Let's discuss on IoT Security, why it's critical for your Home Device's security. IoT is expanding, and It's fair to think about IoT Security.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2018\/11\/iot-road.jpg","width":900,"height":585,"caption":"IoT"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/5-ridiculous-but-real-reasons-iot-security-is-critical\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"5 Ridiculous (But Real) Reasons IoT Security is Critical"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/9c03cf290f2c4d018d113632b853c80c","name":"Adam Thompson","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/78239165ecb118435d2709ba4dd124dd9151b1f6b069f87258c6514fe3728c7e?s=96&d=mm&r=g","caption":"Adam Thompson"},"description":"Adam has 16 years of experience in ecommerce and digital technology. He writes on digital strategy and cybersecurity for industry publications including InfoSec Insights, Ryte Magazine, Search Engine Journal, and Moz."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/11","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=11"}],"version-history":[{"count":10,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/11\/revisions"}],"predecessor-version":[{"id":470,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/11\/revisions\/470"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/15"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=11"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=11"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=11"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}