{"id":20745,"date":"2020-04-14T16:16:16","date_gmt":"2020-04-14T20:16:16","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=20745"},"modified":"2025-04-17T14:44:18","modified_gmt":"2025-04-17T18:44:18","slug":"setup-security-remote-work","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/","title":{"rendered":"How to set up security for remote work"},"content":{"rendered":"<p>Many IT service providers are in the process of moving their SMB clients to cloud environments to support their new remote workers. These transitions are great opportunities to modernize network security.<\/p>\n<p>However, this can be a challenge when security for remote work isn\u2019t your customers\u2019 main focus, which is likely the case right now. They understandably just want new services up and running fast to keep their staff productive. Even though security isn&#8217;t one of their priorities, it should be one of yours. There\u2019s a good chance that the new services you\u2019re deploying now will become permanent additions to your customers\u2019 IT portfolios. You don\u2019t want one of them getting compromised six months down the road.<\/p>\n<p>Let\u2019s go over some essential cloud security concepts and services you should consider putting in place right now.<\/p>\n<h2><span lang=\"EN\">Use the Zero Trust security model<\/span><\/h2>\n<p>While most of us are working together to get through this current crisis, there are still bad actors out there looking to exploit vulnerable business networks. The new cloud technologies that you provision need to be secured against these attackers.<\/p>\n<p>The traditional \u201ccastle\u201d model of network security that emphasizes strong perimeters was already showing its age. And now, with everyone working from home, it makes even less sense. Every user action is passing over the internet from home networks to business networks and back again.<\/p>\n<p>The Zero Trust model for network security is much better suited to cloud services. Modern data control tools, like some of those discussed below, are an essential component. The Zero Trust model focuses on authenticating user and device identity at the point of every network interaction. Once authorized, only the least privileged access is assigned whenever possible.<\/p>\n<div style=\"text-align: center;\">\n<p><iframe loading=\"lazy\" title=\"Cybersecurity _ What is zero trust and how does it work?\" width=\"640\" height=\"360\" src=\"https:\/\/www.youtube.com\/embed\/a0FXu7_Jpbo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<\/div>\n<p style=\"text-align: center;\"><em>Want to learn more about Zero Trust? Watch this quick explainer from Roddy Bergeron, Sherweb&#8217;s Cybersecurity Technical Fellow, to learn how it works and why it\u2019s critical for securing cloud-based remote work environments.<\/em><\/p>\n<h2><span lang=\"EN\">Include multi-factor authentication<\/span><\/h2>\n<p>With everyone working at home, network services will start seeing authentication requests come in from a variety of new and unsecured home networks. Attackers may try to hide their login attempts in this wave of new traffic.<\/p>\n<p>Multi-factor authentication can help keep new sign-in requests secure. Fortunately, there are multi-factor tools included in Microsoft 365, and some are also available in Azure tenants if you have AD Premium licenses.<\/p>\n<p>You can configure Microsoft 365 and Azure to send secondary authentication requests via SMS, email, or the MS Authenticator mobile app. All are <a href=\"https:\/\/www.sherweb.com\/blog\/office-365\/office-365-multi-factor-authentication\/\" target=\"_blank\" rel=\"noopener noreferrer\">easy to configure<\/a> in the Microsoft 365 or Azure Admin Center.<\/p>\n<h2>VPNs are an important consideration<\/h2>\n<p>VPNs have been a staple corporate network technology for years, but for many SMBs, they\u2019ve never been a high priority need. That can change when the majority of a business workforce moves off-site. Directly exposing more connections and resources to the Internet creates too many attack surfaces.<\/p>\n<p>If a customer doesn\u2019t already have a VPN consider deploying one so you can safely control access to services inside one manageable container. We\u2019ve also found conditional access policies are a great way to prevent connections from unqualified sources. And if you already have VPNs deployed for certain customers, make sure to validate them for the higher utilization rates you\u2019re expecting to see over the coming months.<\/p>\n<h2><span lang=\"EN\">Set up device management<\/span><\/h2>\n<p>Many SMB clients may not have bothered to deal with BYOD policies in their workplace before. Now with staff at home, many businesses might have most of their workers connecting from personal devices. Over time this can become a real management and security headache.<\/p>\n<p>Microsoft Intune offers mobile device and application management on Microsoft\u2019s cloud services like O365 and Azure. It lets you monitor personal and corporate devices to make sure they\u2019re compliant with security policies. You can restrict what client data is shared from their cloud tenant and what apps can be installed on devices.<\/p>\n<h2><span lang=\"EN\">Reliable threat detection<\/span><\/h2>\n<p>With everyone working at home, many workflows are in flux. Attackers may use this disruption to hide novel threats in network traffic. Fortunately, there are some reliable threat detection tools available on Microsoft cloud platforms.<\/p>\n<h3><span lang=\"EN\">Microsoft Advanced Threat Protection (ATP)<\/span><\/h3>\n<p>This is a set of threat detection, prevention, and mitigation tools available in a few different versions of Microsoft 365 and Office 365. ATP includes dynamic email attachment, URL, and identity verification that block any malicious activity or files detected. Attachment scanning is able to detect zero-day exploits and will sandbox any suspicious files for further analysis.<\/p>\n<p>ATP also integrates well with the collaboration platforms built on Microsoft cloud services, like SharePoint, OneDrive, and Teams. Files shared on these platforms can be scanned in real-time.<\/p>\n<h3><a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\" target=\"_blank\" rel=\"noopener noreferrer\">Office Protect<\/a><\/h3>\n<p>The popularity of Microsoft cloud services continues to make them enticing targets. As of 2019, Kaspersky Labs found that Microsoft products <u><a href=\"https:\/\/www.zdnet.com\/article\/kaspersky-70-percent-of-attacks-now-target-office-vulnerabilities\/\" target=\"_blank\" rel=\"noopener noreferrer\">remain the target of up to 70% of all cyberattacks<\/a><\/u>.<\/p>\n<p>Sherweb Office Protect is an O365 add-on that lets Sherweb Partners quickly deploy new policies and settings as well as run security reports on their clients\u2019 Microsoft cloud environments. The extra layer of defense provided by Office Protect helps mitigate both attacks and accidental breaches that are more likely as the number of insecure home network connections to corporate resources increases.<\/p>\n<h2><span lang=\"EN\">Backup systems remain important<\/span><\/h2>\n<p>They\u2019re not in the news as much as in previous years, but ransomware attacks remain a serious threat to business data. For that and many other reasons, backup systems will always be important.<\/p>\n<p>As your clients get used to a new way of working, make sure to fine-tune and test their disaster recovery plans. These plans should include backing up any new resources they\u2019ve committed to cloud environments. Tools like <a href=\"https:\/\/www.sherweb.com\/en-ca\/online-backup\/\" target=\"_blank\" rel=\"noopener noreferrer\">Acronis Online Backup<\/a> can help simplify these setups.<\/p>\n<p>Online Backup can automatically backup data from cloud servers as well as PCs, Macs, and connected mobile devices. It can also back up services like Microsoft 365 apps, SQL servers, and Exchange servers. Data is secured at any one of Sherweb\u2019s North American SOC2 Type II-compliant data centers.<\/p>\n<h2>User education is critical<\/h2>\n<p>All these tools are valuable, but half the battle right now will be training users on safe computing practices in their new remote work environments. That training might be challenging when you\u2019re not able to show up on-site to walk staff through a new process.<\/p>\n<p><a href=\"https:\/\/www.sherweb.com\/office-365\/quickhelp\/\" target=\"_blank\" rel=\"noopener noreferrer\">QuickHelp<\/a> security awareness training lets you customize training modules for each client\u2019s needs. You can track their progress so you know exactly what sessions their users have completed. You can also create customized videos to help maintain a personal connection with remote contacts.<\/p>\n<h2>Deploy security that works everywhere<\/h2>\n<p>Your clients may be focused on getting back to work ASAP, but spending the time to secure their new cloud environments today will save you time and headaches months down the road. It will make getting back to business as usual that much safer and easier.<\/p>\n<p>It\u2019s critical to keep your customers secure. <a href=\"https:\/\/www.sherweb.com\/contact-us\/\" target=\"_blank\" rel=\"noopener noreferrer\">Contact Sherweb<\/a> today for help finding the right cloud security solutions.<\/p>\n<div class=\"iframe-container\"><iframe src=\"https:\/\/www.youtube.com\/embed\/-H6EKldLs0k\"><\/iframe><\/div>\n","protected":false},"excerpt":{"rendered":"<p>Many IT service providers are in the process of moving their SMB clients to cloud environments to","protected":false},"author":177,"featured_media":20751,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[753],"tags":[877,919],"class_list":["post-20745","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security","tag-remote-work","tag-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How to set up security for remote work | Sherweb<\/title>\n<meta name=\"description\" content=\"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to set up security for remote work | Sherweb\" \/>\n<meta property=\"og:description\" content=\"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-14T20:16:16+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-17T18:44:18+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"460\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"How to set up security for remote work\",\"datePublished\":\"2020-04-14T20:16:16+00:00\",\"dateModified\":\"2025-04-17T18:44:18+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/\"},\"wordCount\":1189,\"commentCount\":1,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Setup_Security-1200x480-1.png\",\"keywords\":[\"Remote Work\",\"Cybersecurity\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/\",\"name\":\"How to set up security for remote work | Sherweb\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Setup_Security-1200x480-1.png\",\"datePublished\":\"2020-04-14T20:16:16+00:00\",\"dateModified\":\"2025-04-17T18:44:18+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Setup_Security-1200x480-1.png\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/Setup_Security-1200x480-1.png\",\"width\":1200,\"height\":460,\"caption\":\"security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/security\\\/setup-security-remote-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Security\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/security\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How to set up security for remote work\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to set up security for remote work | Sherweb","description":"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/","og_locale":"en_US","og_type":"article","og_title":"How to set up security for remote work | Sherweb","og_description":"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.","og_url":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2020-04-14T20:16:16+00:00","article_modified_time":"2025-04-17T18:44:18+00:00","og_image":[{"width":1200,"height":460,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png","type":"image\/png"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"How to set up security for remote work","datePublished":"2020-04-14T20:16:16+00:00","dateModified":"2025-04-17T18:44:18+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/"},"wordCount":1189,"commentCount":1,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png","keywords":["Remote Work","Cybersecurity"],"articleSection":["Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/","url":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/","name":"How to set up security for remote work | Sherweb","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png","datePublished":"2020-04-14T20:16:16+00:00","dateModified":"2025-04-17T18:44:18+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Essential cloud concepts and services you should consider putting in place to increase and maintain security for remote work.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#primaryimage","url":"\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png","contentUrl":"\/blog\/wp-content\/uploads\/Setup_Security-1200x480-1.png","width":1200,"height":460,"caption":"security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/security\/setup-security-remote-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Security","item":"https:\/\/www.sherweb.com\/blog\/category\/security\/"},{"@type":"ListItem","position":3,"name":"How to set up security for remote work"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Remote Work","Cybersecurity"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20745","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=20745"}],"version-history":[{"count":21,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20745\/revisions"}],"predecessor-version":[{"id":25432,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/20745\/revisions\/25432"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/20751"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=20745"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=20745"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=20745"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}