{"id":24198,"date":"2023-02-16T11:57:59","date_gmt":"2023-02-16T16:57:59","guid":{"rendered":"https:\/\/www.sherweb.com\/blog\/?p=24198"},"modified":"2025-06-06T11:29:45","modified_gmt":"2025-06-06T15:29:45","slug":"email-provider-right-security","status":"publish","type":"post","link":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/","title":{"rendered":"Making sure your email provider has the right security"},"content":{"rendered":"<p>Cybersecurity should always be top of mind, but email security in particular is one area that <a href=\"https:\/\/www.sherweb.com\/blog\/partner\/sherweb-best-msp-partner-program\/\">managed service providers (MSPs)<\/a> and their clients should always keep a keen eye on. Read any security research report and it will tell you that email is a top threat vector for malicious activity.<\/p>\n<p>The FBI has reported that business email compromise scams cost domestic and international US businesses more than <a href=\"https:\/\/www.ic3.gov\/Media\/Y2022\/PSA220504\">$43 billion<\/a> between 2016 and 2021. While social engineering scams in this category\u2014phishing, account or website spoofing, malware delivered through email attachments, etc.\u2014loom large, attacks on system technology are also prevalent and equally concerning. Servers are attacked in more than <a href=\"https:\/\/www.verizon.com\/business\/resources\/reports\/dbir\/\">80% of breaches<\/a>, and new vulnerabilities are <a href=\"https:\/\/msrc-blog.microsoft.com\/2022\/09\/29\/customer-guidance-for-reported-zero-day-vulnerabilities-in-microsoft-exchange-server\/\">discovered all the time<\/a>.<\/p>\n<p>For MSPs and their clients, this can all seem like an unwinnable situation. How can anyone rest assured their systems are being well looked after? Obviously, trust is a major factor here. And finding an <a href=\"https:\/\/www.sherweb.com\/hosted-exchange\/why-sherweb\/\">email provider you can place your trust in<\/a> is a tall order.<\/p>\n<h2>How to find an email provider you can trust<\/h2>\n<p>When looking for an email provider, it\u2019s important to investigate what security measures, practices and process they have in place. Providers who are unwilling to share information or communicate about these areas are probably a red flag and aren\u2019t worth your time. Questions you should ask a potential provider include:<\/p>\n<ul>\n<li>What server hardware do you use?<\/li>\n<li>What redundancy measures do you have in place?<\/li>\n<li>How many certified technicians do you have?<\/li>\n<li>What kind of support do you offer?<\/li>\n<li>Do you have a strategy for ransomware defense?<\/li>\n<li>What kind of additional security tools can you offer?<\/li>\n<li>Where are your datacenters located?<\/li>\n<li>What kind of compliance features can you provide?<\/li>\n<li>What\u2019s your process for patching and updating?<\/li>\n<\/ul>\n<p>Transparency should be key. Additionally, in the event of an attack or breach, your email provider should have a clear communication and remediation plan that they can share with you.<\/p>\n<h2>Why Sherweb\u2019s Hosted Exchange solution is a great choice for MSPs and their clients<\/h2>\n<p>Sherweb has been in the email provider business for over 20 years. Our <a href=\"https:\/\/www.sherweb.com\/hosted-exchange\/\">Hosted Exchange<\/a> infrastructure is based on a reliable, scalable platform that provides a stable and secure messaging environment for more than 25,000 businesses around the world. Furthermore, every critical component is equipped with a corresponding redundant counterpart.<\/p>\n<p>All data associated with our Hosted Exchange offering is backed up daily to a dedicated system. Our networks are monitored 24\/7\/365 by certified technicians, and all of our server hardware sits safely in enterprise-grade datacenters based in Canada and the US.<\/p>\n<p>Understanding the importance of <a href=\"https:\/\/techcommunity.microsoft.com\/t5\/exchange-team-blog\/protect-your-exchange-servers\/ba-p\/3726001\">keeping Exchange servers regularly updated<\/a>, Sherweb is committed to providing 99.9% guaranteed uptime for Hosted Exchange. We keep security at the forefront of our operations to ensure this promise stays honest, with adequate backup and data replication in place so that all client data is protected and recoverable. Our <a href=\"https:\/\/www.sherweb.com\/partners\/support\/\">support technicians<\/a> are readily available to answer partner and end-client concerns by phone, email or chat at any time, resulting in a one-day resolution time for the vast majority of tickets. We also offer email archiving to maintain reliable, historical records of partner data, as well as data loss prevention and encryption to provide compliance with HIPAA, SOX and GLBA.<\/p>\n<h2>Going beyond your typical email provider: Additional security tools to keep MSPs and their clients safe<\/h2>\n<p>As a value-added cloud solutions provider, Sherweb is also prepared to help partners improve security posture for both themselves and their clients with a variety of solutions available through our <a href=\"https:\/\/www.sherweb.com\/partners\/what-you-sell\/\">cloud marketplace<\/a>. Whether you\u2019re looking for additional email security, data backup and replication, endpoint protection or managed detection and response capabilities, Sherweb experts can work with you to keep your systems protected.<\/p>\n<p>Our <a href=\"https:\/\/www.sherweb.com\/security\/\">portfolio of security, backup and compliance solutions<\/a> includes\u2026<\/p>\n<h3>Bitdefender<\/h3>\n<p>Providing powerful antivirus and endpoint security, <a href=\"https:\/\/www.sherweb.com\/security\/bitdefender\/\">Bitdefender<\/a> is a strong option for any organization\u2019s ransomware defense strategy. With a low resource footprint and reduced number of detected false positives, Bitdefender offers MSPs and their clients patch management, security for virtualized environments and specific security for Microsoft Exchange, among other features.<\/p>\n<h3>Office Protect<\/h3>\n<p>Sherweb\u2019s in-house solution for Microsoft 365 security, <a href=\"https:\/\/www.sherweb.com\/security\/office-protect\/\">Office Protect<\/a> provides 24\/7 monitoring, alerts and security reporting for MSP tenants. Due to the sweeping nature of Microsoft 365 security and varying needs of different customers, managing different settings and parameters across clients can be easier said than done. By outsourcing round-the-clock security monitoring and response to Sherweb experts, partners can gain peace of mind that their customer environments are being watched over and alerted to suspicious activity as soon as it appears.<\/p>\n<h3>Proofpoint<\/h3>\n<p>Taking a layered approach to cybersecurity is considered best practice, and this can\u2019t be understated when it comes to email. Compatible with Microsoft 365 and Hosted Exchange, <a href=\"https:\/\/www.sherweb.com\/security\/proofpoint\/\">Proofpoint<\/a> ensures clients\u2019 email environments\u2014which, as we\u2019ve discussed here, are among the most vulnerable points for all businesses\u2014are protected against malware, ransomware, phishing and other advanced threats.<\/p>\n<h3>Trend Micro<\/h3>\n<p>Another leader in both endpoint and extended detection and response, <a href=\"https:\/\/www.sherweb.com\/security\/trend-micro\/\">Trend Micro<\/a> outfits MSPs with the right capabilities to seek out and eliminate threats before they occur. Partners can also take advantage of a managed XDR offering to offload monitoring, detection and response to Trend Micro\u2019s experts and relieve internal security teams from time-consuming alert triage and remediation efforts.<\/p>\n<h3>Microsoft 365 backup powered by Veeam<\/h3>\n<p>In the event that an attack does happen, reliable backups are one of the last defenses against losing data and by extension, losing business. Unfortunately, too many businesses neglect to back up sensitive information on a regular basis. Sherweb\u2019s in-house backup as a service (BaaS) solution, <a href=\"https:\/\/www.sherweb.com\/security\/veeam-backup-m365\/\">Microsoft 365 backup powered by Veeam<\/a>, makes this process predictable and reliable. For protecting and replicating servers or additional workloads outside of Microsoft 365, Sherweb also offers <a href=\"https:\/\/www.sherweb.com\/security\/veeam\/\">Veeam Cloud Connect<\/a>.<\/p>\n<h3 class=\"ewa-rteLine\">IRONSCALES<\/h3>\n<div class=\"ewa-rteLine\">Designed for MSPs, <a href=\"https:\/\/www.sherweb.com\/security\/ironscales\/\">IRONSCALES<\/a> brings AI-driven protection to the inbox. It defends against phishing and business email compromise using real-time detection, automated response and easy-to-manage simulations. With a centralized, multi-tenant platform, it\u2019s a powerful addition to any layered email security strategy<\/div>\n<h2>Work with a provider you can rely on<\/h2>\n<p>Your and your clients\u2019 security should be a top concern for the provider you work with, whether that\u2019s an email provider alone or otherwise. Want to learn more about how Sherweb\u2019s Hosted Exchange offer and other value-added cloud services can set your business up for success, in addition to keeping you safe? Explore our <a href=\"https:\/\/www.sherweb.com\/partner-guide\/registration\/\">partner guide<\/a> to see how we can help your business grow, or <a href=\"https:\/\/cumulus.sherweb.com\/partners\/signup\/?Culture=en-US\">join our partner program<\/a> today to get started.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity should always be top of mind, but email security in particular is one area that man","protected":false},"author":177,"featured_media":24201,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[752],"tags":[3,919,1005],"class_list":["post-24198","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cloud-server","tag-hosted-exchange","tag-cybersecurity","tag-cloud-infrastructure"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Does your email provider have adequate security?<\/title>\n<meta name=\"description\" content=\"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here&#039;s what to look for.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Does your email provider have adequate security?\" \/>\n<meta property=\"og:description\" content=\"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here&#039;s what to look for.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Sherweb\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Sherweb\" \/>\n<meta property=\"article:published_time\" content=\"2023-02-16T16:57:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-06T15:29:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"920\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"The Sherweb Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:site\" content=\"@SherWeb\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"The Sherweb Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/\"},\"author\":{\"name\":\"The Sherweb Team\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"headline\":\"Making sure your email provider has the right security\",\"datePublished\":\"2023-02-16T16:57:59+00:00\",\"dateModified\":\"2025-06-06T15:29:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/\"},\"wordCount\":1092,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/HE-provider-right-security-1200x480-1.jpg\",\"keywords\":[\"Hosted Exchange\",\"Cybersecurity\",\"Cloud Infrastructure\"],\"articleSection\":[\"Cloud Server\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/\",\"name\":\"Does your email provider have adequate security?\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#primaryimage\"},\"thumbnailUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/HE-provider-right-security-1200x480-1.jpg\",\"datePublished\":\"2023-02-16T16:57:59+00:00\",\"dateModified\":\"2025-06-06T15:29:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\"},\"description\":\"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here's what to look for.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#primaryimage\",\"url\":\"\\\/blog\\\/wp-content\\\/uploads\\\/HE-provider-right-security-1200x480-1.jpg\",\"contentUrl\":\"\\\/blog\\\/wp-content\\\/uploads\\\/HE-provider-right-security-1200x480-1.jpg\",\"width\":2400,\"height\":920},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/cloud-server\\\/email-provider-right-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cloud Server\",\"item\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/category\\\/cloud-server\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Making sure your email provider has the right security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/\",\"name\":\"Sherweb\",\"description\":\"More than a cloud marketplace\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/#\\\/schema\\\/person\\\/42a19dccace310904575a5656cc20976\",\"name\":\"The Sherweb Team\",\"url\":\"https:\\\/\\\/www.sherweb.com\\\/blog\\\/author\\\/the-sherweb-team\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Does your email provider have adequate security?","description":"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here's what to look for.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/","og_locale":"en_US","og_type":"article","og_title":"Does your email provider have adequate security?","og_description":"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here's what to look for.","og_url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/","og_site_name":"Sherweb","article_publisher":"https:\/\/www.facebook.com\/Sherweb","article_published_time":"2023-02-16T16:57:59+00:00","article_modified_time":"2025-06-06T15:29:45+00:00","og_image":[{"width":2400,"height":920,"url":"https:\/\/www.sherweb.com\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg","type":"image\/jpeg"}],"author":"The Sherweb Team","twitter_card":"summary_large_image","twitter_creator":"@SherWeb","twitter_site":"@SherWeb","twitter_misc":{"Written by":"The Sherweb Team","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#article","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/"},"author":{"name":"The Sherweb Team","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"headline":"Making sure your email provider has the right security","datePublished":"2023-02-16T16:57:59+00:00","dateModified":"2025-06-06T15:29:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/"},"wordCount":1092,"commentCount":0,"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg","keywords":["Hosted Exchange","Cybersecurity","Cloud Infrastructure"],"articleSection":["Cloud Server"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/","url":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/","name":"Does your email provider have adequate security?","isPartOf":{"@id":"https:\/\/www.sherweb.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#primaryimage"},"image":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#primaryimage"},"thumbnailUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg","datePublished":"2023-02-16T16:57:59+00:00","dateModified":"2025-06-06T15:29:45+00:00","author":{"@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976"},"description":"Obviously, trust is a major factor here. And finding an email provider you can place your trust in is a tall order. Here's what to look for.","breadcrumb":{"@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#primaryimage","url":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg","contentUrl":"\/blog\/wp-content\/uploads\/HE-provider-right-security-1200x480-1.jpg","width":2400,"height":920},{"@type":"BreadcrumbList","@id":"https:\/\/www.sherweb.com\/blog\/cloud-server\/email-provider-right-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.sherweb.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Cloud Server","item":"https:\/\/www.sherweb.com\/blog\/category\/cloud-server\/"},{"@type":"ListItem","position":3,"name":"Making sure your email provider has the right security"}]},{"@type":"WebSite","@id":"https:\/\/www.sherweb.com\/blog\/#website","url":"https:\/\/www.sherweb.com\/blog\/","name":"Sherweb","description":"More than a cloud marketplace","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.sherweb.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.sherweb.com\/blog\/#\/schema\/person\/42a19dccace310904575a5656cc20976","name":"The Sherweb Team","url":"https:\/\/www.sherweb.com\/blog\/author\/the-sherweb-team\/"}]}},"tag_names":["Hosted Exchange","Cybersecurity","Cloud Infrastructure"],"_links":{"self":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24198","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/users\/177"}],"replies":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/comments?post=24198"}],"version-history":[{"count":3,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24198\/revisions"}],"predecessor-version":[{"id":25523,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/posts\/24198\/revisions\/25523"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media\/24201"}],"wp:attachment":[{"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/media?parent=24198"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/categories?post=24198"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.sherweb.com\/blog\/wp-json\/wp\/v2\/tags?post=24198"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}