{"id":778,"date":"2024-02-15T06:44:19","date_gmt":"2024-02-15T06:44:19","guid":{"rendered":"https:\/\/sygitechblog.bhaskaryadav.me\/?p=778"},"modified":"2024-07-19T12:28:27","modified_gmt":"2024-07-19T12:28:27","slug":"security-and-vulnerability-assessment-by-managed-it-services","status":"publish","type":"post","link":"https:\/\/www.sygitech.com\/blog\/security-and-vulnerability-assessment-by-managed-it-services\/","title":{"rendered":"Security and Vulnerability assessment by Managed IT services"},"content":{"rendered":"\n<p>Oct 2022<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"443\" src=\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\" alt=\"\" class=\"wp-image-4990\" srcset=\"https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg 800w, https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87-300x166.jpeg 300w, https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87-768x425.jpeg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/figure>\n\n\n\n<p>Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp;<\/p>\n\n\n\n<p>Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such potential threats with apt analysis before they impact business. Vulnerability assessment and management as a service can help you with day-to-day operations to experts who provide granular focus of each vulnerability.<\/p>\n\n\n\n<p><em>Recently, Microsoft has released workaround guidance to address a remote code execution (RCE) vulnerability\u2014CVE-2022-30190, known as &#8220;Follina&#8221;\u2014affecting the Microsoft Support Diagnostic Tool (MSDT) in Windows. A remote, unauthenticated attacker could exploit this vulnerability to take control of an affected system. Microsoft has reported active exploitation of this vulnerability in the wild.<\/em><\/p>\n\n\n\n<p><em>ref:Microsoft Releases Advisory to Address Critical Remote Code Execution Vulnerability (CVE-2022-26809) | CISA<\/em><\/p>\n\n\n\n<p>The defense in fix is incorporated into the cumulative updates for Windows 10 and newer versions. When URL protocol is used for calling MSDT from any application such as word, a remote code vulnerability exists. In this case, an attacker can run arbitrary code with privileges. Microsoft took care of such a vulnerability by introducing software patches in Windows 10 version and higher.&nbsp;&nbsp;<\/p>\n\n\n\n<p>For Windows 7 and 8, You can use the <strong>SCCM (system center configuration manager) application<\/strong> to fix the Remote Code Execution Vulnerability.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img decoding=\"async\" width=\"546\" height=\"342\" src=\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-85.jpeg\" alt=\"\" class=\"wp-image-4991\" srcset=\"https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-85.jpeg 546w, https:\/\/www.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-85-300x188.jpeg 300w\" sizes=\"(max-width: 546px) 100vw, 546px\" \/><\/figure>\n\n\n\n<p>Ref: Security and Vulnerability Management Market Expected to Grow (openpr.com)<\/p>\n\n\n\n<p>The main types of security vulnerabilities based on their more extrinsic weaknesses:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Porous defense<\/li>\n\n\n\n<li>Risky resource management<\/li>\n\n\n\n<li>Insecure interaction between components<\/li>\n<\/ul>\n\n\n\n<p>A porous defense weakness is one that could allow users to bypass or spoof authentication and authorization processes. Usually, there are many applications like Duo which use authentication processes. The Duo authentication process can be bypassed. There are chances to use the organization resources bypassing the authentication or authorization process. Application is helpful, allowing users to connect users to organization networks remotely; however if the authentication process is bypassed, there can be an issue with data security. There must be a way to trigger an alarm or message if any user working remotely, bypassing the authentication and message should go to their respective IT admins. <a href=\"https:\/\/www.sygitech.com\/it-infrastructure-management.html\"><strong>Managed IT services<\/strong><\/a> in India who cater IT security services have majorly focussed on such vulnerabilities, helping in running the production work load smoothly.<\/p>\n\n\n\n<p>Understanding the vulnerabilities and its nature, we have to either schedule timely patches to systems or build a software that automatically fixes any vulnerabilities understanding its pattern. This might take some time as technology is still dependent on the mind of coders\/developers. Machine learning\/AI is a fix that includes algorithms which can detect\/identify the behavior of any program\/software. Shaping up the technology according to organization standards needs collaborative efforts. Security Analysts can monitor and help organizations to fix the security vulnerabilities and protect the organization data as well.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Oct 2022 Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp; Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[54],"tags":[],"class_list":["post-778","post","type-post","status-publish","format-standard","hentry","category-managed-it-services"],"featured_image_src":"","author_info":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Security and Vulnerability assessment by Managed IT services - Sygitech Blog<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security and Vulnerability assessment by Managed IT services - Sygitech Blog\" \/>\n<meta property=\"og:description\" content=\"Oct 2022 Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp; Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\" \/>\n<meta property=\"og:site_name\" content=\"Sygitech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-02-15T06:44:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-19T12:28:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\" \/>\n<meta name=\"author\" content=\"sygitechadmin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"sygitechadmin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\"},\"author\":{\"name\":\"sygitechadmin\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/5f76975e1aa8dfd74be323ada1adde77\"},\"headline\":\"Security and Vulnerability assessment by Managed IT services\",\"datePublished\":\"2024-02-15T06:44:19+00:00\",\"dateModified\":\"2024-07-19T12:28:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\"},\"wordCount\":499,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\",\"articleSection\":[\"Managed IT Services\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\",\"url\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\",\"name\":\"Security and Vulnerability assessment by Managed IT services - Sygitech Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\",\"datePublished\":\"2024-02-15T06:44:19+00:00\",\"dateModified\":\"2024-07-19T12:28:27+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage\",\"url\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\",\"contentUrl\":\"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.sygitech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security and Vulnerability assessment by Managed IT services\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#website\",\"url\":\"https:\/\/www.sygitech.com\/blog\/\",\"name\":\"Sygitech Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.sygitech.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#organization\",\"name\":\"Sygitech Blog\",\"url\":\"https:\/\/www.sygitech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"\",\"contentUrl\":\"\",\"width\":181,\"height\":24,\"caption\":\"Sygitech Blog\"},\"image\":{\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/5f76975e1aa8dfd74be323ada1adde77\",\"name\":\"sygitechadmin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g\",\"caption\":\"sygitechadmin\"},\"sameAs\":[\"https:\/\/new.sygitech.com\/blog\"],\"url\":\"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security and Vulnerability assessment by Managed IT services - Sygitech Blog","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html","og_locale":"en_US","og_type":"article","og_title":"Security and Vulnerability assessment by Managed IT services - Sygitech Blog","og_description":"Oct 2022 Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp; Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such [&hellip;]","og_url":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html","og_site_name":"Sygitech Blog","article_published_time":"2024-02-15T06:44:19+00:00","article_modified_time":"2024-07-19T12:28:27+00:00","og_image":[{"url":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg","type":"","width":"","height":""}],"author":"sygitechadmin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"sygitechadmin","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#article","isPartOf":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html"},"author":{"name":"sygitechadmin","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/5f76975e1aa8dfd74be323ada1adde77"},"headline":"Security and Vulnerability assessment by Managed IT services","datePublished":"2024-02-15T06:44:19+00:00","dateModified":"2024-07-19T12:28:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html"},"wordCount":499,"commentCount":0,"publisher":{"@id":"https:\/\/www.sygitech.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage"},"thumbnailUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg","articleSection":["Managed IT Services"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html","url":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html","name":"Security and Vulnerability assessment by Managed IT services - Sygitech Blog","isPartOf":{"@id":"https:\/\/www.sygitech.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage"},"thumbnailUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg","datePublished":"2024-02-15T06:44:19+00:00","dateModified":"2024-07-19T12:28:27+00:00","breadcrumb":{"@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#primaryimage","url":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg","contentUrl":"https:\/\/new.sygitech.com\/blog\/wp-content\/uploads\/2024\/07\/image-87.jpeg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sygitech.com\/blog\/managed-it-services\/security-and-vulnerability-assessment-by-managed-it-services.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sygitech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security and Vulnerability assessment by Managed IT services"}]},{"@type":"WebSite","@id":"https:\/\/www.sygitech.com\/blog\/#website","url":"https:\/\/www.sygitech.com\/blog\/","name":"Sygitech Blog","description":"","publisher":{"@id":"https:\/\/www.sygitech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sygitech.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.sygitech.com\/blog\/#organization","name":"Sygitech Blog","url":"https:\/\/www.sygitech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/","url":"","contentUrl":"","width":181,"height":24,"caption":"Sygitech Blog"},"image":{"@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/5f76975e1aa8dfd74be323ada1adde77","name":"sygitechadmin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sygitech.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e9fdd499d3d969f7856da967b9c1103b4a59c61a2bea820c91cd847be24c0b89?s=96&d=mm&r=g","caption":"sygitechadmin"},"sameAs":["https:\/\/new.sygitech.com\/blog"],"url":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"}]}},"featured_image_src_square":false,"rbea_author_info":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"rbea_excerpt_info":"Oct 2022 Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp; Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such [&hellip;]","category_list":"<a href=\"https:\/\/www.sygitech.com\/blog\/category\/managed-it-services\/\" rel=\"category tag\">Managed IT Services<\/a>","comments_num":"0 comments","rttpg_featured_image_url":null,"rttpg_author":{"display_name":"sygitechadmin","author_link":"https:\/\/www.sygitech.com\/blog\/author\/sygitechadmin\/"},"rttpg_comment":0,"rttpg_category":"<a href=\"https:\/\/www.sygitech.com\/blog\/category\/managed-it-services\/\" rel=\"category tag\">Managed IT Services<\/a>","rttpg_excerpt":"Oct 2022 Expertise, good analytics and defense mechanisms are required against advanced cyber attacks. In hybrid environment systems, tools and applications are in cloud and non- cloud premises. The Security admin team might struggle with threat detection and response.&nbsp; Security analyst \/ infrastructure management analyst &nbsp;help you to detect, triage, investigate and respond to such&hellip;","_links":{"self":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/778","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/comments?post=778"}],"version-history":[{"count":2,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions"}],"predecessor-version":[{"id":4992,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/posts\/778\/revisions\/4992"}],"wp:attachment":[{"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/media?parent=778"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/categories?post=778"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sygitech.com\/blog\/wp-json\/wp\/v2\/tags?post=778"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}