{"id":18435,"date":"2019-07-23T15:45:33","date_gmt":"2019-07-23T19:45:33","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=18435"},"modified":"2020-06-19T10:01:26","modified_gmt":"2020-06-19T14:01:26","slug":"office-protect-feature-block-bad-file-extension-attachments","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/","title":{"rendered":"Office Protect Feature, Block Bad File Extension Attachments"},"content":{"rendered":"<p>Security is very important when you own a small business. After all, you wouldn\u2019t let just anyone into your building, would you? And you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad attachments are just the same when sent in an email.<\/p>\n<p>While we naturally protect ourselves and our businesses in the physical world, things become a little trickier in the virtual world. There, you invite strangers into your building every day via your website, email, and other communication systems. And not only do you invite them, but you also <em>welcome<\/em> them\u2014that\u2019s how you get new customers and partners in today\u2019s world, after all.<\/p>\n<p>But when we invite strangers into our business, whether physically or virtually, we&#8217;re always assuming an inherent level of risk, and we must take steps to protect ourselves. This becomes especially true virtually because the danger is often unseen and unpredictable.<\/p>\n<p>&nbsp;<\/p>\n<h3><a href=\"https:\/\/info.sherweb.com\/office-protect-m365-security.html\" target=\"_blank\" rel=\"noopener noreferrer\">Learn how Office Protect helps keep your Microsoft 365 tenants safe with our e-book<\/a><\/h3>\n<p>&nbsp;<\/p>\n<h2>The Threat of Email<\/h2>\n<p>One of the <a href=\"https:\/\/www.sherweb.com\/blog\/security\/5-common-office-365-attacks-and-how-to-avoid-them\/\" target=\"_blank\" rel=\"noopener noreferrer\">main virtual threats<\/a> comes from something you use every day: your email system. That&#8217;s simply because it&#8217;s the most common tool your employees use and is fairly easy to exploit. In fact, around 25% of emails sent in Office 365 <a href=\"https:\/\/info.sherweb.com\/office365-security-guide.html\" target=\"_blank\" rel=\"noopener noreferrer\">contain phishing or malware messages<\/a>, and that number is only expected to keep rising.<\/p>\n<p>&nbsp;<\/p>\n<h3>Malware<\/h3>\n<p>So how do hackers use your email system to do harm to your business? Usually, this happens via <strong>malware<\/strong>, which is really just a name for any software that does something malicious\u2014it&#8217;s usually designed specifically to cause harm or disrupt a business.<\/p>\n<p>There are many different kinds of malware, including viruses, Trojan horses, spyware, worms, ransomware, and keyloggers. All of these can infiltrate your entire system and wreak havoc. Spyware and keyloggers can track data for as long as no one notices and export much of your data to nefarious sources. Worms and Trojan horses can shut down your entire system just for amusement.<\/p>\n<p>&nbsp;<\/p>\n<h3>Ransomware<\/h3>\n<p>Ransomware is an entirely different beast that allows hackers to take complete control of your systems and demand payment from you before allowing you to regain access. This can happen to businesses both large and small.<\/p>\n<p>The City of Baltimore was <a href=\"https:\/\/www.nytimes.com\/2019\/05\/22\/us\/baltimore-ransomware.html\" target=\"_blank\" rel=\"noopener noreferrer\">a recent victim of a ransomware attack<\/a>; many people were unable to pay their water bills or sell homes as a consequence. Other recent examples include a ski resort in which guests were <a href=\"https:\/\/slate.com\/technology\/2017\/02\/the-ransomware-attack-that-locked-hotel-guests-out-of-their-rooms.html\" target=\"_blank\" rel=\"noopener noreferrer\">blocked from entering or leaving their rooms<\/a> and even a hospital that got locked out of its own systems.<\/p>\n<p>&nbsp;<\/p>\n<h3>Phishing<\/h3>\n<p>Generally, malware infiltrates your system through phishing. Phishing occurs when a hacker puts out some virtual \u201cbait\u201d for you to bite at, which could be anything from an email that looks like it&#8217;s from management to a seemingly harmless message that&#8217;s supposedly from a family member.<\/p>\n<p>Phishing is a significant problem that is not going away\u2014a recent report by Microsoft shows that phishing has grown by over 250%, with no sign of slowing. And while it&#8217;s easy to brush off phishing as something that no intelligent person would ever fall for, nothing could be further from the truth\u201441% of phishing domains include just one character swap (making them difficult to spot), and Verizon recently showed that <a href=\"https:\/\/www.comparitech.com\/vpn\/cybersecurity-cyber-crime-statistics-facts-trends\/\" target=\"_blank\" rel=\"noopener noreferrer\">30% of phishing emails are opened<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>Email Attachments: The Sleeping Dragons<\/h2>\n<p>So an employee opens an email\u2014no big deal, right? What harm could that possibly cause? Well, the problem is when an employee clicks on the infected email attachment. Everything is fine as long as the attachment is \u201casleep,\u201d peacefully dormant in your inbox. But as soon as it\u2019s clicked, it&#8217;s awoken and will attack and infiltrate your system.<\/p>\n<p>What\u2019s worse is that you might not even know that this has happened. Malware is often designed to run unnoticed in the background for months or even weeks until hackers are ready to strike. And while your employee might think nothing more than, \u201cOh, how strange&#8230; This link that my husband sent me with pictures of our kids didn\u2019t open,\u201d in reality, she&#8217;s just allowed a dangerous stranger waltz right through the front door.<\/p>\n<p>This is not an uncommon occurrence, either: Verizon found that <a href=\"https:\/\/www.shredit.com\/en-us\/blog\/securing-your-information\/march-2018-(1)\/email-security-\u2013-discover-the-top-5-ways-cyber-cri\" target=\"_blank\" rel=\"noopener noreferrer\">66% of malware was installed via malicious email attachments<\/a>. So if you don\u2019t catch the phishing attack upfront, how can you know if an attachment is malicious?<\/p>\n<p>&nbsp;<\/p>\n<h2>Extension Types<\/h2>\n<p>You certainly know which types of files your employees typically need to send back and forth when communicating with each other or their family members. Word docs, PDFs, and PowerPoints may fly back and forth all day, but there is very little reason for an .exe file (an executable) to be sent in day-to-day office communication. In fact, this file type, and many like it, exists to run arbitrary codes or commands on your computer, and <a href=\"https:\/\/www.howtogeek.com\/137270\/50-file-extensions-that-are-potentially-dangerous-on-windows\/\" target=\"_blank\" rel=\"noopener noreferrer\">there is really no way to secure it<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h2>How Office Protect Can Help<\/h2>\n<p>Fortunately, Office Protect is here to help. With one simple setting, you can block all of those \u201cbad\u201d file extensions that might pose a threat to your business through emails. Simply access it from your dashboard\u2014go into the settings, and you&#8217;ll see the on\/off toggle menu, security impact (medium), and user impact (medium).<\/p>\n<p>This setting will block the following file extensions: .ace .ade .adp .ani .app .asp .bas .bat .cer .chm .cmd .com .cpl .crt .csh .der .dll .docm .dos .exe .fxp .gadget .hlp .hta .inf .ins .isp .its .jar .js .jse .ksh .lnk .mad .mam .maq .mar .mas .mat .mau .mav .maw .mda .mdb .mde .mdt .mdw .mdz .msc .msh .msh1 .msh1xml .msh2 .mshxml .msi .msp .mst .obj .ops .os2 .pcd .pif .plg .prf .prg .ps1 .ps1xml .ps2 .ps2xml .psc1 .psc2 .pst .rar .reg .scf .scr .sct .shb .shs .tmp .url .vb .vbe .vbs .vsmacros .vsw .vxd .w16 .ws .wsc .wsf .wsh .xnk .mcf .cnt .jnlp .grp .hpj .xbap .website .webpnp .vbp .theme .msu .osd .pl .printerexport .psd1 .psdm1 .msh2xml.<\/p>\n<p>If for some reason your employees do need to send these file types regularly, you can utilize a medium other than email (like SharePoint) to exchange them.<\/p>\n<p>Malicious file extensions are a real threat, but Office Protect can step up to help you protect your business.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Security is very important when you own a small business. After all, you wouldn\u2019t let just anyo","protected":false},"author":177,"featured_media":18436,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[826],"class_list":["post-18435","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-office-protect"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Office Protect Feature, Block Bad File Extension Attachments | Sherweb<\/title>\n<meta name=\"description\" content=\"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Office Protect Feature, Block Bad File Extension Attachments | Sherweb\" \/>\n<meta property=\"og:description\" content=\"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2019-07-23T19:45:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-19T14:01:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Office Protect Feature, Block Bad File Extension Attachments\",\"datePublished\":\"2019-07-23T19:45:33+00:00\",\"dateModified\":\"2020-06-19T14:01:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/\"},\"wordCount\":1073,\"commentCount\":4,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-Security-block-bad-files.jpg\",\"keywords\":[\"Office Protect\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/\",\"name\":\"Office Protect Feature, Block Bad File Extension Attachments | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-Security-block-bad-files.jpg\",\"datePublished\":\"2019-07-23T19:45:33+00:00\",\"dateModified\":\"2020-06-19T14:01:26+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-Security-block-bad-files.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/blogHero-Security-block-bad-files.jpg\",\"width\":1200,\"height\":460,\"caption\":\"Enable MFA\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/office-protect-feature-block-bad-file-extension-attachments\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Office Protect Feature, Block Bad File Extension Attachments\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Office Protect Feature, Block Bad File Extension Attachments | Sherweb","description":"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/","og_locale":"en_US","og_type":"article","og_title":"Office Protect Feature, Block Bad File Extension Attachments | Sherweb","og_description":"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2019-07-23T19:45:33+00:00","article_modified_time":"2020-06-19T14:01:26+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Office Protect Feature, Block Bad File Extension Attachments","datePublished":"2019-07-23T19:45:33+00:00","dateModified":"2020-06-19T14:01:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/"},"wordCount":1073,"commentCount":4,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg","keywords":["Office Protect"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/","url":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/","name":"Office Protect Feature, Block Bad File Extension Attachments | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg","datePublished":"2019-07-23T19:45:33+00:00","dateModified":"2020-06-19T14:01:26+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"you definitely wouldn\u2019t allow a stranger to enter your premises and bring an unknown object that could cause harm. Bad email attachments are just the same.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#primaryimage","url":"\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg","contentUrl":"\/blog\/wp-content\/uploads\/blogHero-Security-block-bad-files.jpg","width":1200,"height":460,"caption":"Enable MFA"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/office-protect-feature-block-bad-file-extension-attachments\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Office Protect Feature, Block Bad File Extension Attachments"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Office Protect"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18435","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=18435"}],"version-history":[{"count":6,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18435\/revisions"}],"predecessor-version":[{"id":21388,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/18435\/revisions\/21388"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/18436"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=18435"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=18435"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=18435"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}