{"id":8705,"date":"2018-08-03T16:41:06","date_gmt":"2018-08-03T21:41:06","guid":{"rendered":"https:\/\/hml.iticollege.edu\/?p=8705"},"modified":"2018-08-03T16:41:06","modified_gmt":"2018-08-03T21:41:06","slug":"five-major-changes-to-cyber-security-in-the-last-ten-years","status":"publish","type":"post","link":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/","title":{"rendered":"Five Major Changes to Cyber Security in the Last Ten Years"},"content":{"rendered":"<p>As you work toward becoming an <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/want-to-change-your-life-consider-an-information-security-degree\/\">information technology security officer<\/a>, you will learn quite a bit about the nature of cyber security. Most importantly, you will learn that there have been some major changes to the security landscape in the last ten years. Today, we are going to review some of those changes and uncover exactly what they mean. Information technology security careers can be very enlightening and very exciting at the same time, and you may be surprised at how quickly this dynamic industry changes.<\/p>\n<h2>Hacking \u2013 It is More than Just a Hobby in 2018<\/h2>\n<p>Several years ago, hacking was simply a pastime for teenagers, children, and young adults with programming knowledge and experience. In 2018 though, hacking represents an entire industry that threatens data security across all industries. Some of these young hackers have matured, honed their skills, and gained employment at black hat organizations that steal money, corporate secrets, and much more. In fact, hacking has become so advanced that younger hackers no longer accomplish the same feats they were several years ago. This is due largely to <a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/information-security-training\/\">information technology<\/a> (IT) security, and the need for those in information technology security careers has never been greater.<\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-8182 size-full\" title=\"information technology security officer\" src=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg\" alt=\"information technology security officer\" width=\"1580\" height=\"400\" \/><\/p>\n<h2>Security \u2013 It has All been Compromised<\/h2>\n<p>At this point in IT history, almost every available technological platform has been hacked in one way or another. From mobile phones to tablets, to laptops, and desktop computers; hackers have slipped in trojans, adware, or spyware to extract personal data. Some of your own devices may have even been hacked without your knowledge. Many times, individuals who do not possess data of worth or interest are not even alerted to these hacks.<\/p>\n<h2>Breach Detection is Better Now than Ever Before<\/h2>\n<p>In the beginning, we relied almost exclusively on antivirus scanners. Today, we use a wide range of tools to detect malicious activity. Sometimes, malicious activity could even be carried out by a legitimate user. In other words, we need to pay close attention to both internal and external threats.<\/p>\n<h2>Multifactor Authentication is Everywhere<\/h2>\n<p>Multifactor authentication is not new by any stretch of the imagination, but it has improved significantly. In addition to improvement, we are now seeing increased implementation. Several years ago, you would see multifactor authentication applications at data-sensitive institutions such as medical offices, research facilities, and government agencies. Recently though, this technology has become attainable use in non-sensitive industries and even in private homes. This allows for greater security and easier recovery if an account is stolen. While this method of security will not solve every single security problem we face in 2018, it will go a long way toward preventing data theft and account takeovers.<\/p>\n<h2>Encryption is Key in 2018<\/h2>\n<p>We are now seeing quite a lot of encryption in use all over the world. For example, most websites use some form of Secure Sockets Layer (SSL). Just look at the address bar the next time you visit your favorite website and see if it displays a small lock symbol. This lock signifies a secured site. While there are many who are against these levels of encryption, including the government, it is helping us to forge a safer, more efficient world.<\/p>\n<p>There have been many different changes to the information technology landscape and most importantly, the security technology landscape. It is difficult to say where it will go from here and what major changes are about to be made, but we can tell that it is going to be interesting. As we continue to emphasize our focus on infrastructure, we can develop better preventative measures that the industry will be able to utilize.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Disclosure:<\/strong><\/p>\n<p class=\"western\"><strong>For more information about graduation rates, the median debt of students who completed the program, and other important information, please visit our website:\u00a0<\/strong><a href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/\" target=\"_blank\" rel=\"noopener noreferrer\">https:\/\/impactwindowswholesaler.com\/iticollege\/disclosures\/<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As you work toward becoming an information technology security officer, you will learn quite a bit about the nature of [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"default","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-opacity":"","overlay-gradient":""}},"footnotes":""},"categories":[21],"tags":[92,93,105,94,106,107,96,97,98,99,100],"class_list":["post-8705","post","type-post","status-publish","format-standard","hentry","category-news","tag-computer-information-security-technology-training","tag-define-information-technology-security","tag-information-security-classes","tag-information-security-degree","tag-information-security-training","tag-information-systems-security-school","tag-information-technology-credits","tag-information-technology-homeland-security","tag-information-technology-security-careers","tag-information-technology-security-certification","tag-information-technology-security-officer"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.1.1 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five Major Changes to Cyber Security in the Last Ten Years<\/title>\n<meta name=\"description\" content=\"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five Major Changes to Cyber Security in the Last Ten Years\" \/>\n<meta property=\"og:description\" content=\"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\" \/>\n<meta property=\"og:site_name\" content=\"ITI College\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-03T21:41:06+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"headline\":\"Five Major Changes to Cyber Security in the Last Ten Years\",\"datePublished\":\"2018-08-03T21:41:06+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\"},\"wordCount\":640,\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg\",\"keywords\":[\"Computer &amp; Information security Technology Training\",\"define information technology security\",\"information security classes\",\"information security degree\",\"information security training\",\"information systems security school\",\"information technology credits\",\"information technology homeland security\",\"information technology security careers\",\"information technology security certification\",\"information technology security officer\"],\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\",\"name\":\"Five Major Changes to Cyber Security in the Last Ten Years\",\"isPartOf\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg\",\"datePublished\":\"2018-08-03T21:41:06+00:00\",\"author\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\"},\"description\":\"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.\",\"breadcrumb\":{\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-1.jpg\",\"contentUrl\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-1.jpg\",\"width\":1580,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five Major Changes to Cyber Security in the Last Ten Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#website\",\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/\",\"name\":\"ITI College\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"https:\/\/impactwindowswholesaler.com\/iticollege\"],\"url\":\"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five Major Changes to Cyber Security in the Last Ten Years","description":"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/","og_locale":"en_US","og_type":"article","og_title":"Five Major Changes to Cyber Security in the Last Ten Years","og_description":"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.","og_url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/","og_site_name":"ITI College","article_published_time":"2018-08-03T21:41:06+00:00","og_image":[{"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg","type":"","width":"","height":""}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#article","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/"},"author":{"name":"admin","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"headline":"Five Major Changes to Cyber Security in the Last Ten Years","datePublished":"2018-08-03T21:41:06+00:00","mainEntityOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/"},"wordCount":640,"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg","keywords":["Computer &amp; Information security Technology Training","define information technology security","information security classes","information security degree","information security training","information systems security school","information technology credits","information technology homeland security","information technology security careers","information technology security certification","information technology security officer"],"articleSection":["News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/","name":"Five Major Changes to Cyber Security in the Last Ten Years","isPartOf":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website"},"primaryImageOfPage":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage"},"image":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage"},"thumbnailUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-2.jpg","datePublished":"2018-08-03T21:41:06+00:00","author":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112"},"description":"As an information security officer you will need to know about the various changes in the IT landscape. Look at these major changes over ten years.","breadcrumb":{"@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#primaryimage","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-1.jpg","contentUrl":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-content\/uploads\/2018\/06\/IT_Lab01-1.jpg","width":1580,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/five-major-changes-to-cyber-security-in-the-last-ten-years\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/impactwindowswholesaler.com\/iticollege\/"},{"@type":"ListItem","position":2,"name":"Five Major Changes to Cyber Security in the Last Ten Years"}]},{"@type":"WebSite","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#website","url":"https:\/\/impactwindowswholesaler.com\/iticollege\/","name":"ITI College","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/impactwindowswholesaler.com\/iticollege\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/129c0a945aa30ff7326588b7a52ab112","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/impactwindowswholesaler.com\/iticollege\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d4e700a92858d155f0bc45b7354947cc2f9e7789e83b4c758f2b283c08fe7db8?s=96&d=mm&r=g","caption":"admin"},"sameAs":["https:\/\/impactwindowswholesaler.com\/iticollege"],"url":"https:\/\/impactwindowswholesaler.com\/iticollege\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/8705","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/comments?post=8705"}],"version-history":[{"count":0,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/posts\/8705\/revisions"}],"wp:attachment":[{"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/media?parent=8705"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/categories?post=8705"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/impactwindowswholesaler.com\/iticollege\/wp-json\/wp\/v2\/tags?post=8705"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}