{"id":5992,"date":"2016-05-25T14:15:20","date_gmt":"2016-05-25T19:15:20","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=5992"},"modified":"2016-05-25T14:15:20","modified_gmt":"2016-05-25T19:15:20","slug":"four-real-world-examples-information-systems-security-failure","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/","title":{"rendered":"Four Real World Examples of Information Systems Security Failure"},"content":{"rendered":"<p><a href=\"http:\/\/whatis.techtarget.com\/definition\/cybersecurity\" target=\"_blank\" rel=\"noopener\">Cyber security<\/a> isn\u2019t a joke anymore, it\u2019s a real problem that needs to be addressed. In the early days of the internet, before the real rise of the Digital Age, hard-copies were preferred over digital, and the prevalence of hacking was still minimal. Those days are long since gone, but it seems plenty of companies, financial institutions, and even the United States government are still living in a dreamland of simpler times. Let\u2019s take a look at four real world examples of failures in cyber security.<\/p>\n<h2>An Alarming Trend In The U.S. Government<\/h2>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"alignright wp-image-1031 size-full\" title=\"Computer &amp; Information security Technology Training\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg\" alt=\"Computer &amp; Information security Technology Training\" width=\"350\" height=\"208\" \/>The United States has an alarming <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/the-importance-of-information-systems-security\/\">information systems security<\/a> problem that many people don\u2019t realize. Given the frequency with which various government organizations are hacked, it is quite possible the government doesn\u2019t even know they have a problem. In 2012 alone, government computers were breached, and confidential information was stolen and released, more than 6 times.<\/p>\n<p>One particular blunder that stands out among all the rest in the past decade occurred in the summer of 2015. Not only was it a failure on the part of the systems technicians, but the breach was initially underestimated. It went undetected that 21.5 million people had been put at risk thanks to the theft of a literal treasure trove of personal information that included Social Security numbers and even some fingerprints. This particular series of attacks was believed to originate in China and was stated as the largest cyber attack into the systems of the United States government. Michael Daniel, White House cybersecurity coordinator stated after that this called for both the private and public sector to increase security measures, and he was absolutely right.<\/p>\n<h2>The Exit Interview<\/h2>\n<p>In 2014, Sony Pictures was set to release a movie that was controversial from the day they green-lit production \u2013 The Interview. Back in the early days of motion picture entertainment, secrets could die in soundproof rooms and there was no internet trail to follow down the rabbit hole into the deep, dark depths. That doesn\u2019t hold true anymore, and on the morning of November 24<sup>th<\/sup>, 2015, studio executive Amy Pascal arrived in her office to find her computer had been hacked. The screen was taken over and displayed an image overlayed with the words, \u201cWe\u2019ve obtained all your internal data including your secrets and top secrets. If you don\u2019t obey us, we\u2019ll release data shown below to the world.\u201d The \u201cdata\u201d below consisted of five links that held all of the internal records for Sony Pictures.<\/p>\n<p>It wasn\u2019t just her computer, though. Every computer connected to the network worldwide went down that day with the same on-screen message. The hackers, Guardians of Peace, attacked the studio because of the movie The Interview, which mocked North Korean leader Kim Jong Un. Sony was in chaos, as insiders described it, and the mess wasn\u2019t cleaned up in any sort of expeditious manner. In the end, it led to the studio executive, Amy Pascal, resigning for a failure that did not rest solely on her.<\/p>\n<h2>This Data Leak Is Bananas<\/h2>\n<p>Back in April of this year, many might remember John Oliver addressing the <a href=\"http:\/\/www.usatoday.com\/story\/money\/2016\/04\/03\/german-paper-massive-financial-leak-reveals-offshort-accounts\/82586798\/\" target=\"_blank\" rel=\"noopener\">Panama financial data leak<\/a> on his show. This data leak linked 12 world leaders and 60 relatives of world leaders to shady, illegal financial activities including secret off-shore companies and massive money-laundering rings. It\u2019s too early to tell what kind of long-term effects this information will have on the political careers of those involved, but it is sure to be a big one.<\/p>\n<h2>In Today\u2019s News\u2026Again.<\/h2>\n<p><img decoding=\"async\" class=\"alignright wp-image-467 size-full\" title=\"Computer &amp; Information security Technology Training\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2014\/04\/student-portal.jpg\" alt=\"Computer &amp; Information security Technology Training\" width=\"290\" height=\"200\" \/>Yahoo has, once again, been hacked. It\u2019s so common for Yahoo email to be attacked that it\u2019s hardly even newsworthy anymore. Just days ago on May 5<sup>th<\/sup>, 272.3 million stolen email accounts from several providers, including Yahoo, were discovered. This stash of information is considered the largest discovered since one that was found two years ago containing bank and retailer information. It is unknown when this information was even gathered at this early point in the discovery. Most of the data uncovered was from Russia\u2019s most-used email provider, Mail.ru, but this may not even be all of the stockpiled information.<\/p>\n<h2>A Growing Need<\/h2>\n<p>The need for information technology security officers to help maintain the safeguards that protect digital information is only growing. Take the field with <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\">Computer &amp; Information security Technology Training<\/a> from ITI College. With each new report of cyber security breaches, the desperate need becomes clearer and we at ITI are ready to help train you to face the challenges presented in the cyber security field.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cyber security isn\u2019t a joke anymore, it\u2019s a real problem that needs to be addressed. In the early days of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,94,95,96,97,98,99,100],"class_list":["post-5992","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-degree","tag-information-systems-security","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Four Real World Examples of Information Systems Security Failure<\/title>\n<meta name=\"description\" content=\"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Four Real World Examples of Information Systems Security Failure\" \/>\n<meta property=\"og:description\" content=\"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2016-05-25T19:15:20+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Four Real World Examples of Information Systems Security Failure\",\"datePublished\":\"2016-05-25T19:15:20+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\"},\"wordCount\":801,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security degree\",\"information systems security\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\",\"name\":\"Four Real World Examples of Information Systems Security Failure\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg\",\"datePublished\":\"2016-05-25T19:15:20+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Four Real World Examples of Information Systems Security Failure\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Four Real World Examples of Information Systems Security Failure","description":"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/","og_locale":"en_US","og_type":"article","og_title":"Four Real World Examples of Information Systems Security Failure","og_description":"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/","og_site_name":"ITI College","article_published_time":"2016-05-25T19:15:20+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Four Real World Examples of Information Systems Security Failure","datePublished":"2016-05-25T19:15:20+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/"},"wordCount":801,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security degree","information systems security","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/","name":"Four Real World Examples of Information Systems Security Failure","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2016\/09\/drafting-small-1.jpg","datePublished":"2016-05-25T19:15:20+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"Discover four real-world examples of cyber security failures that prove hacking needs to be taken more seriously. ITI College can help.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/four-real-world-examples-information-systems-security-failure\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Four Real World Examples of Information Systems Security Failure"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/5992","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=5992"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/5992\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=5992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=5992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=5992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}