{"id":4684,"date":"2019-04-15T15:34:30","date_gmt":"2019-04-15T20:34:30","guid":{"rendered":"https:\/\/blog.mcmdigitalproducts.com\/website-security-in-a-constant-threat-environment\/4684\/"},"modified":"2019-04-15T15:43:47","modified_gmt":"2019-04-15T20:43:47","slug":"website-security-in-a-constant-threat-environment","status":"publish","type":"post","link":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684","title":{"rendered":"Website Security in a constant threat environment"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-4689 size-medium\" src=\"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/website-security-267x400.jpg\" alt=\"website-security\" width=\"267\" height=\"400\" srcset=\"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/website-security-267x400.jpg 267w, https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/website-security-60x90.jpg 60w, https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/website-security-13x20.jpg 13w, https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/website-security.jpg 300w\" sizes=\"(max-width: 267px) 100vw, 267px\" \/>I was reading a <a href=\"https:\/\/www.wordfence.com\/blog\/2019\/04\/zero-day-vulnerability-in-yellow-pencil-visual-theme-customizer-exploited-in-the-wild\/\" target=\"_blank\" rel=\"noopener noreferrer\"><em>Website Security<\/em><\/a> journal the other day and an article brought to mind an incident some 10 years ago that shaped the future of my company.\u00a0 Some of my clients can remember when their website went down in 2009.\u00a0 The cause?\u00a0 A hardware failure on a server farm.\u00a0 This was back before cloud backups were ubiquitous, and my web host stored backups, images and live websites all on the same machine.\u00a0 Yikes.\u00a0 I had to rebuild every website from backups I had (that didn&#8217;t include the latest content updates) and scraps from Google and other archives on the web.\u00a0 Not. Even. Fun.<\/p>\n<p>While most sites were restored within a few days, it was about 3 months before everyone was back up and running.\u00a0 That was a learning experience.\u00a0 At the time, I knew little about servers and such.\u00a0 I was a designer after all.<\/p>\n<h2>Website Security Threat<\/h2>\n<p>These days, the threat of hardware failure has been replaced largely by hackers who desire to turn your website into a botnet which attacks other websites &#8211; or they simply hold your data for ransom.<\/p>\n<h3>Website Security threat prevention or mitigation?<\/h3>\n<p>I regularly am contacted by folks who&#8217;ve heard about me through existing clients and need someone to &#8216;fix&#8217; their website.\u00a0 I can tell you from experience &#8211; it&#8217;s a lot easier to prevent a website intrusion than to &#8216;fix&#8217; it after the fact.\u00a0 These calls have become so common that I&#8217;ve rolled out <em><strong>Website Security<\/strong><\/em> features into our Website Care plans.\u00a0 Depending on the plan, we shedule intense scans to detect any anomalies.\u00a0 Our care plans include measures to repel attacks as well as rapidly mitigate any breaches.<\/p>\n<p><iframe loading=\"lazy\" title=\"Massive WordPress Security Alert - My WordPress Website Was HACKED! Must Watch Video!!\" width=\"1080\" height=\"608\" src=\"https:\/\/www.youtube.com\/embed\/kK-GoDKDRuc?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/p>\n<p>Since we use the most popular website platform for our clients, we&#8217;re especially sensitive to reported attacks targeting it.<\/p>\n<p>If you&#8217;ve watched the video above, you know that this guy&#8217;s pretty sharp &#8211; and even his own site was recently hacked!\u00a0 So even if you think you&#8217;re doing everything right, it can still happen.\u00a0 That&#8217;s why it&#8217;s important to have a reliable &#8211; let me say that again &#8211; RELIABLE website restoration plan that&#8217;s easy to use and fast, so that you can roll back the site to a pre-hack state.\u00a0 Often the &#8216;free&#8217; backup plugins or services are worth what you&#8217;ve paid for them due to their complexity or need to access server resources that may be unavailable due to the hack.<\/p>\n<p>I recently had to roll back a website that had software issues.\u00a0 It took about 45 seconds.\u00a0 So much easier than building from scratch!\u00a0 \ud83d\ude09<\/p>\n<p>If you&#8217;re ready to protect your valuable investment with the <em>website security<\/em> features in our care plans, you can <a href=\"https:\/\/blog.mcmdigitalproducts.com\/website-care\/#careplans\">choose one here<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>I was reading a Website Security journal the other day and an article brought to mind an incident some 10 years ago that shaped the future of my company.\u00a0 Some of my clients can remember when their website went down in 2009.\u00a0 The cause?\u00a0 A hardware failure on a server farm.\u00a0 This was back before [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":4687,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[295],"tags":[],"class_list":["post-4684","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security","et-has-post-format-content","et_post_format-et-post-format-standard"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Website Security in a constant threat environment | MCM Digital Products<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/blog.mcmdigitalproducts.com\/?p=4684\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Website Security in a constant threat environment | MCM Digital Products\" \/>\n<meta property=\"og:description\" content=\"I was reading a Website Security journal the other day and an article brought to mind an incident some 10 years ago that shaped the future of my company.\u00a0 Some of my clients can remember when their website went down in 2009.\u00a0 The cause?\u00a0 A hardware failure on a server farm.\u00a0 This was back before [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/blog.mcmdigitalproducts.com\/?p=4684\" \/>\n<meta property=\"og:site_name\" content=\"MCM Digital Products\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/mcmdigitalmarketing\" \/>\n<meta property=\"article:published_time\" content=\"2019-04-15T20:34:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-04-15T20:43:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"533\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Ken Ivey\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McmProducts\" \/>\n<meta name=\"twitter:site\" content=\"@McmProducts\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Ken Ivey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684\"},\"author\":{\"name\":\"Ken Ivey\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/person\\\/bd0a6cbad76db9041a15de87d9ee7b40\"},\"headline\":\"Website Security in a constant threat environment\",\"datePublished\":\"2019-04-15T20:34:30+00:00\",\"dateModified\":\"2019-04-15T20:43:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684\"},\"wordCount\":468,\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacker.jpg\",\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684\",\"name\":\"Website Security in a constant threat environment | MCM Digital Products\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacker.jpg\",\"datePublished\":\"2019-04-15T20:34:30+00:00\",\"dateModified\":\"2019-04-15T20:43:47+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#primaryimage\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacker.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/hacker.jpg\",\"width\":800,\"height\":533,\"caption\":\"hacker - website security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?p=4684#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Website Security in a constant threat environment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#website\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\",\"name\":\"Michael Cummings Marketing Blog\",\"description\":\"Our Most Important Metric is Client Results\",\"publisher\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#organization\",\"name\":\"MCM Products, LLC\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/wp-content\\\/uploads\\\/2024\\\/04\\\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg\",\"width\":349,\"height\":142,\"caption\":\"MCM Products, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/mcmdigitalmarketing\",\"https:\\\/\\\/x.com\\\/McmProducts\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.mcmdigitalproducts.com\\\/#\\\/schema\\\/person\\\/bd0a6cbad76db9041a15de87d9ee7b40\",\"name\":\"Ken Ivey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g\",\"caption\":\"Ken Ivey\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Website Security in a constant threat environment | MCM Digital Products","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684","og_locale":"en_US","og_type":"article","og_title":"Website Security in a constant threat environment | MCM Digital Products","og_description":"I was reading a Website Security journal the other day and an article brought to mind an incident some 10 years ago that shaped the future of my company.\u00a0 Some of my clients can remember when their website went down in 2009.\u00a0 The cause?\u00a0 A hardware failure on a server farm.\u00a0 This was back before [&hellip;]","og_url":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684","og_site_name":"MCM Digital Products","article_publisher":"https:\/\/www.facebook.com\/mcmdigitalmarketing","article_published_time":"2019-04-15T20:34:30+00:00","article_modified_time":"2019-04-15T20:43:47+00:00","og_image":[{"width":800,"height":533,"url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg","type":"image\/jpeg"}],"author":"Ken Ivey","twitter_card":"summary_large_image","twitter_creator":"@McmProducts","twitter_site":"@McmProducts","twitter_misc":{"Written by":"Ken Ivey","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#article","isPartOf":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684"},"author":{"name":"Ken Ivey","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/person\/bd0a6cbad76db9041a15de87d9ee7b40"},"headline":"Website Security in a constant threat environment","datePublished":"2019-04-15T20:34:30+00:00","dateModified":"2019-04-15T20:43:47+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684"},"wordCount":468,"publisher":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#primaryimage"},"thumbnailUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg","articleSection":["Website Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684","url":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684","name":"Website Security in a constant threat environment | MCM Digital Products","isPartOf":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#primaryimage"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#primaryimage"},"thumbnailUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg","datePublished":"2019-04-15T20:34:30+00:00","dateModified":"2019-04-15T20:43:47+00:00","breadcrumb":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.mcmdigitalproducts.com\/?p=4684"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#primaryimage","url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg","contentUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2019\/04\/hacker.jpg","width":800,"height":533,"caption":"hacker - website security"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.mcmdigitalproducts.com\/?p=4684#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.mcmdigitalproducts.com\/"},{"@type":"ListItem","position":2,"name":"Website Security in a constant threat environment"}]},{"@type":"WebSite","@id":"https:\/\/blog.mcmdigitalproducts.com\/#website","url":"https:\/\/blog.mcmdigitalproducts.com\/","name":"Michael Cummings Marketing Blog","description":"Our Most Important Metric is Client Results","publisher":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.mcmdigitalproducts.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/blog.mcmdigitalproducts.com\/#organization","name":"MCM Products, LLC","url":"https:\/\/blog.mcmdigitalproducts.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/logo\/image\/","url":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2024\/04\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg","contentUrl":"https:\/\/blog.mcmdigitalproducts.com\/wp-content\/uploads\/2024\/04\/MCM-Sword-Green-Letters-2-1.jpg-copy-copy-1.jpg","width":349,"height":142,"caption":"MCM Products, LLC"},"image":{"@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/mcmdigitalmarketing","https:\/\/x.com\/McmProducts"]},{"@type":"Person","@id":"https:\/\/blog.mcmdigitalproducts.com\/#\/schema\/person\/bd0a6cbad76db9041a15de87d9ee7b40","name":"Ken Ivey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3f5c429480bd7ec822ccbc5fe598bd7e1092fd9653e84076442c1f8b377b2a6?s=96&d=mm&r=g","caption":"Ken Ivey"}}]}},"_links":{"self":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts\/4684","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=4684"}],"version-history":[{"count":0,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/posts\/4684\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=\/wp\/v2\/media\/4687"}],"wp:attachment":[{"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=4684"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=4684"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.mcmdigitalproducts.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=4684"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}