{"id":16962,"date":"2018-11-05T12:02:38","date_gmt":"2018-11-05T17:02:38","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=16962"},"modified":"2023-05-26T17:58:13","modified_gmt":"2023-05-26T21:58:13","slug":"phishing-office-365-protect-your-organization","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/","title":{"rendered":"Phishing in Office 365: Protect Your Organization from Scams"},"content":{"rendered":"<p>When they think of their IT system being compromised, most people picture a suspicious character in a dark room feverishly typing lines of code into a terminal. But this couldn\u2019t be further from the truth. In reality, most IT threats to your organization come in the form of phishing. In this article, we\u2019ll take a look at three ways you can protect your organization from phishing attempts.<\/p>\n<h2>What is Phishing?<\/h2>\n<p>It\u2019s certainly not the loveable afternoon sport, though both of these activities do involve luring in unsuspecting prey with bait. Simply put, <strong>phishing<\/strong> is when a scammer pretends to be an official service provider\u2014such as a bank, Microsoft, or an associate\u2014and asks for your log-in credentials.<br \/>\n<br \/>\nFirst, they\u2019ll grab your attention with an email or call that directs you, via a link or attachment, to take action, such as urgently renewing your subscription (fear motivation), accepting a payment invoice (reward motivation), sharing a funny old memory that includes you (social proof motivation), or one of many other motivations.<\/p>\n<p>But once you click on this email item, before you can take action, you\u2019ll be asked to provide log-in details on a fake page. And often, this page can actually appear very official, with a similar URL to that of the real site and perhaps even the same logo. More sophisticated phishing scams can even replicate the backend of your service when you log in (e.g., some direct you to the real page with a \u201cTry again\u201d prompt).<\/p>\n<p>These scammers may already have some of your details to appear more legitimate, such as your name, your business partners\u2019 names (especially if their security\u2019s been compromised), or even your credit card details\u2014and for that last one, they often just need the pin number or CCV number on the back of your card.<\/p>\n<p>Unfortunately, it\u2019s very common for Office 365 users to be targeted by phishing scams. This is because the robust Office platform is a standardized system that is highly recognizable and therefore easy to replicate.<\/p>\n<p>Once the scammer has access to your system, they\u2019ll then be able to send information with your secure credentials, such as a ransomware virus that will encrypt your data for blackmail, or simply delete critical files. They will then also send additional phishing scam emails from your account to others within your organization, thereby multiplying the impact.<\/p>\n<p>So what can you do to prevent your IT system from falling to these phishing scams? Let\u2019s find out.<\/p>\n<h3><a href=\"https:\/\/www.sherweb.com\/resell-office-365\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sherweb makes Office 365 easy so you can focus on your business<\/a><\/h3>\n<h2>1. Educate Your System Users<\/h2>\n<p>The simplest way to prevent scammers from infiltrating your IT system is by simply educating your system users and making sure they\u2019re aware of common scams and how to identify phishing emails.<\/p>\n<p>When receiving an email that appears to be from an official source, the most common items to review are the following:<\/p>\n<ul>\n<li><strong>The URL (if any) that you\u2019re directed to.<\/strong> Always check the URL when clicking a link from an email and landing on a sign-in page. Though the page may look the same as what you\u2019re used to, it may very well be fake. The URL may be spelled slightly differently or have a different top-level domain, for instance. Scamwatch gives this example: \u201cIf the legitimate site is &#8216;www.realbank.com.au&#8217;, the scammer may use an address like &#8216;www.reallbank.com&#8217;.\u201dAdding on to this, the site may also have a different top-level domain. For example, if the real site is again &#8216;www.realbank.com.au&#8217;, a fake site might be www.realbank.tv or www.realbank.webhost.com.au.<\/li>\n<li><strong>Lack of web encryption.<\/strong> Secure log-in pages will often be encrypted to protect the information you enter into the forms. That way, your credentials are less likely to be intercepted by attackers when they\u2019re transmitted over the Internet. Encryption can be identified in the URL as an HTTPS as opposed to HTTP (where the extra S stands for Secure). You may also see a green padlock in your browser next to the URL.<\/li>\n<li><strong>Spelling and grammar mistakes.<\/strong> Believe it or not, despite attempting to replicate a website, scammers often make simple grammar and spelling mistakes. An office web portal, such as that of Office 365, will have been reviewed by multiple copyeditors several times before it\u2019s ever published.<\/li>\n<li><strong>A generic salutation.<\/strong> If a legitimate client or service provider contacts you, they will most likely call you by your full name or registered nickname, not a generic \u201cDear customer.\u201d This is made famous by PayPal phishing emails that address you as, \u201cHello sir\/madam.\u201d Legitimate PayPal representatives will know your name and gender, based on your account details stored in their secure databases.<\/li>\n<\/ul>\n<p>Sometimes, you can check if an email is a common scam by copy-pasting its contents into Google. You may find that other victims of a phishing scam may have posted the email contents on online forums.<\/p>\n<p>Remember, an official service provider would never ask for your log-in details by email, phone, or IM. They would never need to access your files, and even if they did, they already control the servers that host your details and could simply work around your login through official channels.<\/p>\n<p>If they call you, simply ask for a case number or their name. Then, look up the organization\u2019s number on their official website and call them back referencing this incident. Do not call the number that the suspected scammers provide you on the phone.<\/p>\n<h2>2. Use Built-in Office 365 Protection<\/h2>\n<p>The first step in using Office 365\u2019s built-in protection is to ensure that you have the latest security updates. Office 365 offers great anti-spam and scam filtering technology, but they are only effective if you update your software.<\/p>\n<p>If you have <a href=\"https:\/\/products.office.com\/en-us\/exchange\/online-email-threat-protection\" target=\"_blank\" rel=\"noopener noreferrer\">Office 365 Advanced Threat Protection<\/a>, then you or your admins can implement advanced rules that protect your system. By using machine learning, Office 365 can understand how your users speak; if someone receives a message from an organization email but the message doesn\u2019t match the sender\u2019s typical language patterns, the system will raise an alert that the sender is potentially being impersonated.<\/p>\n<h2>3. Use Sherweb Office Protect<\/h2>\n<p>The final layer of protection is to use software like <a href=\"https:\/\/www.sherweb.com\/office-365\/security\/\" target=\"_blank\" rel=\"noopener noreferrer\">Sherweb&#8217;s Office Protect<\/a> that\u2019s designed to specifically protect Office 365 users from phishing attempts. This solution comes with (but is not limited to) the following unique services:<\/p>\n<ul>\n<li>Monitoring sign-ins from unusual locations, unknown devices, or IP addresses.<\/li>\n<li>Reviewing any changes to your security policy (that you did not provision yourself).<\/li>\n<li>Implementing more sophisticated machine learning algorithms for Office 365 security.<\/li>\n<\/ul>\n<div class=\"iframe-container\"><iframe src=\"https:\/\/www.youtube.com\/embed\/XiyrvKeOJFM\"><\/iframe><\/div>\n<p>By using common sense and advanced protection tools, Office 365 users can be confident that their system will be protected from phishing attempts and other scams.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>When they think of their IT system being compromised, most people picture a suspicious character ","protected":false},"author":177,"featured_media":16974,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[751],"tags":[826],"class_list":["post-16962","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-office-365","tag-office-protect"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Phishing in Office 365: Protect Your Organization from Scams | Sherweb<\/title>\n<meta name=\"description\" content=\"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing in Office 365: Protect Your Organization from Scams | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-05T17:02:38+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-05-26T21:58:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Data-Loss.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"550\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Phishing in Office 365: Protect Your Organization from Scams\",\"datePublished\":\"2018-11-05T17:02:38+00:00\",\"dateModified\":\"2023-05-26T21:58:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/\"},\"wordCount\":1209,\"commentCount\":2,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Data-Loss.jpg\",\"keywords\":[\"Office Protect\"],\"articleSection\":[\"Microsoft 365\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/\",\"name\":\"Phishing in Office 365: Protect Your Organization from Scams | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Data-Loss.jpg\",\"datePublished\":\"2018-11-05T17:02:38+00:00\",\"dateModified\":\"2023-05-26T21:58:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Data-Loss.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Data-Loss.jpg\",\"width\":1200,\"height\":550,\"caption\":\"phishing\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/microsoft-ecosystem\\\/office-365\\\/phishing-office-365-protect-your-organization\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Microsoft Ecosystem\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Microsoft 365\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/microsoft-ecosystem\\\/office-365\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Phishing in Office 365: Protect Your Organization from Scams\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing in Office 365: Protect Your Organization from Scams | Sherweb","description":"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/","og_locale":"en_US","og_type":"article","og_title":"Phishing in Office 365: Protect Your Organization from Scams | Sherweb","og_description":"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.","og_url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2018-11-05T17:02:38+00:00","article_modified_time":"2023-05-26T21:58:13+00:00","og_image":[{"width":1200,"height":550,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Data-Loss.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Phishing in Office 365: Protect Your Organization from Scams","datePublished":"2018-11-05T17:02:38+00:00","dateModified":"2023-05-26T21:58:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/"},"wordCount":1209,"commentCount":2,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Data-Loss.jpg","keywords":["Office Protect"],"articleSection":["Microsoft 365"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/","url":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/","name":"Phishing in Office 365: Protect Your Organization from Scams | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Data-Loss.jpg","datePublished":"2018-11-05T17:02:38+00:00","dateModified":"2023-05-26T21:58:13+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Learn what phishing scams are and take a look at three different ways you can protect your organization from them in Office 365.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Data-Loss.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Data-Loss.jpg","width":1200,"height":550,"caption":"phishing"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/microsoft-ecosystem\/office-365\/phishing-office-365-protect-your-organization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Microsoft Ecosystem","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/"},{"@type":"ListItem","position":3,"name":"Microsoft 365","item":"https:\/\/www.sherweb.com\/blog\/category\/microsoft-ecosystem\/office-365\/"},{"@type":"ListItem","position":4,"name":"Phishing in Office 365: Protect Your Organization from Scams"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16962","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=16962"}],"version-history":[{"count":11,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16962\/revisions"}],"predecessor-version":[{"id":18691,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16962\/revisions\/18691"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/16974"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=16962"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=16962"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=16962"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}