{"id":16970,"date":"2022-05-05T08:52:40","date_gmt":"2022-05-05T12:52:40","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=16970"},"modified":"2024-06-24T17:28:55","modified_gmt":"2024-06-24T21:28:55","slug":"why-are-msps-targeted-hackers","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/","title":{"rendered":"Why are MSPs targeted by hackers?"},"content":{"rendered":"<p>As more companies outsource their IT and data workloads, having a strong <a href=\"https:\/\/www.sherweb.com\/security\/\">security<\/a> posture is becoming increasing critical for <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/sherweb-best-msp-partner-program\/\">managed service providers (MSPs)<\/a>. Malicious actors are constantly seeking new ways to find and exploit vulernabilities. MSPs in particular are <a href=\"https:\/\/www.msspalert.com\/cybersecurity-news\/cyberattacks-vs-msps-skyrocket\/\">being targetted by attackers<\/a> more and more frequently, putting additional pressure on providers to both shore up on and deliver cybersecurity.<\/p>\n<p>Why are MSPs targeted by hackers? What makes them desirable targets? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices. But we aren\u2019t powerless against the forces of cybercrime\u2014there\u2019s plenty of actions businesses can and should take to protect themselves.<\/p>\n<h2>3 reasons why MSPs are targeted by hackers<\/h2>\n<h3><strong>#1 MSPs serve multiple clients with an even greater number of endpoints<\/strong><\/h3>\n<p>The MSP channel has been growing rapidly for years, and it has only gained more momentum with accelerated <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/digital-transformation-mission-critical\/\">digital transformation<\/a> during the pandemic. This means more customers are trusting MSPs with more of their business data.<\/p>\n<p>Smaller MSPs might not have the resources or <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/sourcing-channel-talent\/\">expertise on staff<\/a> to maintain security infrastructure for a growing number of clients with distributed workforces, making them more vulnerable to cyberattacks. Even a small MSP can serve a massive number of clients, creating the potential for a devastating ripple effect.<\/p>\n<h3>#2 An MSP\u2019s distributed network can facilitate widespread attacks<\/h3>\n<p>In addition to there being more MSP customers out there for hackers to target, MSP networks are also vulnerable to widespread, distributed attacks. It\u2019s not just about having a lot of victims to exploit, but about hitting them <em>at the same time.<\/em> These types of attacks are typically <a href=\"https:\/\/www.computerweekly.com\/microscope\/news\/252515907\/MSPs-remain-ransomware-targets\">associated with ransomware<\/a>.<\/p>\n<h3>#3 MSPs don\u2019t have control over every aspect of a client\u2019s security posture<\/h3>\n<p>While an MSP might be given stewardship of a company&#8217;s data, they may not be engaged with other <a href=\"https:\/\/www.sherweb.com\/blog\/security\/building-your-security-offering\/\">security practices<\/a> such as providing a client&#8217;s employees with <a href=\"https:\/\/www.sherweb.com\/blog\/security\/security-awareness-training-is-no-longer-optional\/\">security training<\/a> or developing security policies. Many times these tasks are left to internal departments, and its easy for knowledge gaps and discrepancies to form between an MSP\u2019s mandate and the client\u2019s own activity. It\u2019s also possible that the client works with other third-party vendors, adding another layer of complexity.<\/p>\n<p>Multiple entrypoints to multiple troves of sensitive information is unfortunately an MSP\u2019s reality. However, the need for constant cybersecurity vigilance represents a huge opportunity for MSPs to provide clients with education and guidance to address vulnerabilities and prevent attacks from occurring or, at the very least, causing widespread damage.<\/p>\n<h2>What MSPs can do to protect themselves<\/h2>\n<p>At the very least, MSPs would do well to implement good security practices such as:<\/p>\n<ol>\n<li>Develop strong password policies<\/li>\n<li>Deploy firewalls<\/li>\n<li>Secure your email system against attacks such as phishing<\/li>\n<li>Monitor network traffic for intrusions<\/li>\n<li>Update and patch servers<\/li>\n<li>Encrypt data<\/li>\n<li>Enable multi-factor authentication<\/li>\n<\/ol>\n<h3>Establish a proactive cybersecurity culture<\/h3>\n<p>Roll out cybersecurity awareness training and introduce policies that safeguard networks and data. This should be a core part of your MSPs internal operations, but can also represent a revenue-generating opportunity when offered to clients.<\/p>\n<h3>Have a solid disaster recovery plan<\/h3>\n<p>Take a <a href=\"https:\/\/www.sherweb.com\/blog\/security\/what-is-baseline-security\/\">multi-layered approach to cybersecurity<\/a> and have a proactive mindset when developing policies, procedures, and response plans for an attack. Ensure all areas of your company are aware of their roles and responsibilites before and after attacks. Engage with any external partners to know how best to plan and prepare actions for attacks if needed.<\/p>\n<h3>Identify solutions that can help you stay ahead of the game<\/h3>\n<p>Make sure you have the right tools to protect and support the services you provide. As an example, <a href=\"https:\/\/www.sherweb.com\/productivity\/microsoft-365\/\">Microsoft 365<\/a> is a popular target and vector for cyberattacks, given its widespread use. There are solutions out there (for instance, <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect<\/a>)\u00a0designed specifically for Microsoft 365 that can help monitor, alert and report on security incidents and suspicious activity across multiple tenants. Endpoint protection and online backup are other examples of key solutions MSPs should have at their disposal.<\/p>\n<h2>The right partner can be instrumental for your cybersecurity success<\/h2>\n<p>Sherweb is committed to helping MSPs deliver cybersecurity for their clients. We have the necessary services, solutions, resources and expertise to help strengthen your security stack. Explore our <a class=\"track-link\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">Partner Guide<\/a> for more information about how we can help your business grow.<br \/>\n<div class=\"p2p\" style=\"margin-top:30px; margin-bottom:30px; border:1px solid #EEE;\">\n    \t\t\t<div class=\"grid-x\">\n        \t\t\t<div class=\"small-12 large-6 columns\">\n        \t\t\t\t<div style=\"padding-top:30px; padding-bottom:30px;\">\n\t\t\t\t\t\t<h3>Grow your MSP business with the right partner<\/h3>\n\t\t\t\t\t\t<p>Sherweb is a value-added cloud solutions provider that can help take your managed services to the next level.<\/p>\n\t\t\t\t\t\t<a target=\"_blank\" data-track=\"\" data-track-action=\"Click\" data-track-category=\"Blog CTA\" data-track-label=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\" class=\"cta\" href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">Learn more<\/a>\n\t\t\t\t\t\t<\/div>\n\t\t\t    \t<\/div>\n        \t\t\t<div class=\"small-12 large-6 columns\" style=\"background-size:cover; background-image:url(https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Banner_PartnerGuide.jpg);\"><\/div>\t\t\t    \t\n\t\t\t    <\/div> <!-- End grid-x !-->\n\t\t\t<\/div> <!-- End ptop !--><\/p>\n","protected":false},"excerpt":{"rendered":"<p>As more companies outsource their IT and data workloads, having a strong security posture is beco","protected":false},"author":177,"featured_media":23605,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[826,919],"class_list":["post-16970","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-office-protect","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>3 reasons why MSPs are targeted by hackers<\/title>\n<meta name=\"description\" content=\"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"3 reasons why MSPs are targeted by hackers\" \/>\n<meta property=\"og:description\" content=\"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-05T12:52:40+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-06-24T21:28:55+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Why are MSPs targeted by hackers?\",\"datePublished\":\"2022-05-05T12:52:40+00:00\",\"dateModified\":\"2024-06-24T21:28:55+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/\"},\"wordCount\":771,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg\",\"keywords\":[\"Office Protect\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/\",\"name\":\"3 reasons why MSPs are targeted by hackers\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg\",\"datePublished\":\"2022-05-05T12:52:40+00:00\",\"dateModified\":\"2024-06-24T21:28:55+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg\",\"width\":2400,\"height\":920,\"caption\":\"Why MSPs are targeted by hackers hero image\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/why-are-msps-targeted-hackers\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why are MSPs targeted by hackers?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"3 reasons why MSPs are targeted by hackers","description":"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/","og_locale":"en_US","og_type":"article","og_title":"3 reasons why MSPs are targeted by hackers","og_description":"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2022-05-05T12:52:40+00:00","article_modified_time":"2024-06-24T21:28:55+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Why are MSPs targeted by hackers?","datePublished":"2022-05-05T12:52:40+00:00","dateModified":"2024-06-24T21:28:55+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/"},"wordCount":771,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg","keywords":["Office Protect","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/","url":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/","name":"3 reasons why MSPs are targeted by hackers","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg","datePublished":"2022-05-05T12:52:40+00:00","dateModified":"2024-06-24T21:28:55+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Why are MSPs targeted by hackers? In a word: access. One MSP can serve hundreds of businesses with thousands of users and devices.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg","contentUrl":"\/blog\/wp-content\/uploads\/Why-MSPs-are-targeted-by-hackers-1200x480@2x.jpg","width":2400,"height":920,"caption":"Why MSPs are targeted by hackers hero image"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/why-are-msps-targeted-hackers\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Why are MSPs targeted by hackers?"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16970","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=16970"}],"version-history":[{"count":11,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16970\/revisions"}],"predecessor-version":[{"id":24873,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/16970\/revisions\/24873"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/23605"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=16970"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=16970"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=16970"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}