{"id":1932,"date":"2021-01-25T11:33:03","date_gmt":"2021-01-25T11:33:03","guid":{"rendered":"https:\/\/www.insurancebee.com\/blog\/?p=1932"},"modified":"2023-02-08T09:55:45","modified_gmt":"2023-02-08T09:55:45","slug":"cyber-terms-and-meanings","status":"publish","type":"post","link":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings","title":{"rendered":"Cyber terms and what they mean"},"content":{"rendered":"\n<figure class=\"wp-block-image size-large is-style-default\"><img loading=\"lazy\" decoding=\"async\" width=\"600\" height=\"400\" src=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png\" alt=\"Cyber terms and what they mean. A to Z book on desk with PC monitor and keyboard\" class=\"wp-image-1950\" srcset=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png 600w, https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary-300x200.png 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/figure>\n\n\n\n<p>Been crypto-jacked? Phished? Cyber terms can be confusing. Even the most IT-savvy among us can find it hard to keep up.<\/p>\n\n\n\n<p><br>To help you tell your worms from your zombies, here\u2019s a cyber security glossary of terms and meanings.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Cyber security terms and meanings<\/h2>\n\n\n\n<p><strong>Antivirus<\/strong><\/p>\n\n\n\n<p>Software you can install on your computer to prevent, detect and remove viruses (including worms and trojans).<\/p>\n\n\n\n<p><strong>Bot<\/strong><\/p>\n\n\n\n<p>Also known as a zombie, a bot is a computer which has been hijacked by hackers. They infect it with malware, take control of it and then use it to carry out other cyber-attacks. Because your computer seems to be working normally, bots are hard to detect.<\/p>\n\n\n\n<p><strong>Botnet<\/strong><\/p>\n\n\n\n<p>A collection of infected and hijacked devices used to carry out cyber-attacks without your knowledge. Cybercriminals sometimes sell botnets on to other hackers.<\/p>\n\n\n\n<p><strong>Bug<\/strong><\/p>\n\n\n\n<p>A small defect, or flaw, in your information system, or device.<\/p>\n\n\n\n<p><\/p>\n\n\n\n<p><strong>Crypto-mining<\/strong><\/p>\n\n\n\n<p>Earning crypto-currency, like Bitcoin, for checking transactions and solving a numeric problem.<br><\/p>\n\n\n\n<p><strong>Crypto-jacking<\/strong><\/p>\n\n\n\n<p>Hacking your computer to mine, or steal, cryptocurrency. Hackers install software which uses your computer\u2019s power and resources to mine. You may notice an increase in noise and a decrease in performance if your computer\u2019s being used for crypto-mining.<\/p>\n\n\n\n<p><strong>Cyber-attack<\/strong><\/p>\n\n\n\n<p>An attempt to access your IT system to steal data, disrupt or damage it<\/p>\n\n\n\n<p><strong>Cybercrime<\/strong><\/p>\n\n\n\n<p>An umbrella term used for lots of different online crimes which target a network, computer or device. Botnetting, phishing and hacking are all types of cybercrime.<br><\/p>\n\n\n\n<p><strong>Cyber extortion<\/strong><\/p>\n\n\n\n<p>When hackers hold your data, website and computer systems hostage until you meet their payment demands, it\u2019s known as cyber extortion. Cyber extortionists use various tactics, including ransomware and (DDoS) attacks.<\/p>\n\n\n\n<p><strong>Cyber insurance<\/strong><\/p>\n\n\n\n<p><a href=\"https:\/\/www.insurancebee.com\/cyber-liability-insurance\" target=\"_blank\" rel=\"noreferrer noopener\">Insurance <\/a>designed specifically to cover the damage cybercrime can do to your business. And the cost of recovering from an attack.<\/p>\n\n\n\n<p><strong>Cybersecurity<\/strong><br><\/p>\n\n\n\n<p>Defenses (a process or technology) designed to protect your network and system from a cyber-attack. A firewall, for example.<\/p>\n\n\n\n<p><strong>Data breach<\/strong><\/p>\n\n\n\n<p>Unauthorized access to your network, computer system and data.<\/p>\n\n\n\n<p><strong>DDoS<\/strong><\/p>\n\n\n\n<p>Short for distributed denial-of-service. In a DDoS attack, hackers use a network of infected computers to flood your web server with messages. This takes it out of service until the messaging stops.<\/p>\n\n\n\n<p><strong>Encrypting<\/strong><br><\/p>\n\n\n\n<p>Changing information into code so it can\u2019t be read by anyone who\u2019s not authorized.<\/p>\n\n\n\n<p><strong>Firewall<\/strong><br><\/p>\n\n\n\n<p>A virtual boundary surrounding a network or device to protect it from cyber-attacks. A firewall can be hardware or software.<\/p>\n\n\n\n<p><strong>Hacker<\/strong><br><\/p>\n\n\n\n<p>Sometimes called mal-actors, a hacker is someone who breaks into computers, systems and networks.<br><\/p>\n\n\n\n<p><strong>Hacking<\/strong><br><\/p>\n\n\n\n<p>Unauthorized access to your network or system.<\/p>\n\n\n\n<p><strong>Hacktivist<\/strong><br><\/p>\n\n\n\n<p>Hackers who attack for a cause, or belief, instead of for financial gain. It\u2019s still illegal, though.<\/p>\n\n\n\n<p><strong>Malware<\/strong><br><\/p>\n\n\n\n<p>Short for \u2018malicious software\u2019, malware is software designed to access your computer system, and damage or disable it. There are many different types of malware, including: virus, worm, Trojan horse, logic bomb, backdoor, ransomware and spyware.<\/p>\n\n\n\n<p><strong>Phishing<\/strong><br><\/p>\n\n\n\n<p>A form of social engineering, phishing attacks can be via email, text or apps. The goal is to try and trick you into giving personal information. Like your passwords and card details.<\/p>\n\n\n\n<p><strong>Pharming<\/strong><br><\/p>\n\n\n\n<p>Tricks you into visiting a fraudulent website without your knowledge, or consent.<\/p>\n\n\n\n<p><strong>Ransomware<\/strong><br><\/p>\n\n\n\n<p>A form of malware that encrypts the data on your computer and holds it hostage until you pay a ransom.<\/p>\n\n\n\n<p><strong>Social engineering<\/strong><br><\/p>\n\n\n\n<p>This kind of attack plays on your emotions to try and trick you into giving out personal information. Phishing, vishing, baiting, malware, pretexting and water-holing are all forms of social engineering.<\/p>\n\n\n\n<p><strong>Spamming<\/strong><br><\/p>\n\n\n\n<p>Unsolicited emails and texts. Most spam is advertising, but some may include malicious links or attachments.<\/p>\n\n\n\n<p><strong>Spyware<\/strong><br><\/p>\n\n\n\n<p>Malware installed on your computer &#8212; often without your knowledge &#8212; to steal your personal information.<\/p>\n\n\n\n<p><strong>Trojan horse<\/strong><br><\/p>\n\n\n\n<p>A virus disguised as a regular application, a trojan horse acts as a portal for other viruses to access your system.<\/p>\n\n\n\n<p><strong>Water-holing<\/strong><br><\/p>\n\n\n\n<p>A social engineering tactic, water-holing takes advantage of the trust you place in websites you visit regularly. Hackers exploit a weakness on the website, take it over and inject code that infects visitors with malware. Or, that leads clicks to malicious pages.<\/p>\n\n\n\n<p><strong>Worm<\/strong><br><\/p>\n\n\n\n<p>A worm can replicate itself and spread quickly through your computer system. It doesn\u2019t need any human involvement to do this. It just exploits holes and weakness in the security system. Worms can steal information, corrupt your files and install a back-door giving remote access to your system.<\/p>\n\n\n\n<p><strong>Vishing<\/strong><br><\/p>\n\n\n\n<p>A phishing attack over the phone. The attacker often falsifies their caller-ID to trick you into thinking the call is legit.<\/p>\n\n\n\n<p><strong>Zombie<\/strong><br><\/p>\n\n\n\n<p>Also called a bot, a zombie is a computer that\u2019s been compromised. The hacker then uses it to transmit viruses and spam to other computers. Zombies are hard to detect as your computer will appear to be working normally.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Been crypto-jacked? Phished? Cyber terms can be confusing. Even the most IT-savvy among us can find it hard to keep up. To help you tell your worms from your zombies, here\u2019s a cyber security glossary of terms and meanings. Cyber &hellip; <a href=\"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings\">Read more&#8230;<\/a><\/p>\n","protected":false},"author":16,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[46],"tags":[78,76,77],"class_list":["post-1932","post","type-post","status-publish","format-standard","hentry","category-cyber-liability","tag-business-interruption-insurance","tag-cyber-liability-insurance","tag-rules-and-regulations"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Cyber terms and their meanings | Cyber security terms<\/title>\r\n<meta name=\"description\" content=\"Confused about cyber terms and their meanings? Here&#039;s InsuranceBee&#039;s glossary - your guide to understanding cybercrime terminology.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Cyber terms and their meanings | Cyber security terms\" \/>\r\n<meta property=\"og:description\" content=\"Confused about cyber terms and their meanings? Here&#039;s InsuranceBee&#039;s glossary - your guide to understanding cybercrime terminology.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings\" \/>\r\n<meta property=\"og:site_name\" content=\"InsuranceBee Blog\" \/>\r\n<meta property=\"article:published_time\" content=\"2021-01-25T11:33:03+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2023-02-08T09:55:45+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png\" \/>\r\n<meta name=\"author\" content=\"Kate Naqvi\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kate Naqvi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings\"},\"author\":{\"name\":\"Kate Naqvi\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\"},\"headline\":\"Cyber terms and what they mean\",\"datePublished\":\"2021-01-25T11:33:03+00:00\",\"dateModified\":\"2023-02-08T09:55:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings\"},\"wordCount\":801,\"image\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-glossary.png\",\"keywords\":[\"business interruption insurance\",\"cyber liability insurance\",\"rules and regulations\"],\"articleSection\":[\"Cyber liability\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings\",\"name\":\"Cyber terms and their meanings | Cyber security terms\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-glossary.png\",\"datePublished\":\"2021-01-25T11:33:03+00:00\",\"dateModified\":\"2023-02-08T09:55:45+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\"},\"description\":\"Confused about cyber terms and their meanings? Here's InsuranceBee's glossary - your guide to understanding cybercrime terminology.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#primaryimage\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-glossary.png\",\"contentUrl\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cyber-glossary.png\",\"width\":600,\"height\":400},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/cyber-terms-and-meanings#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cyber terms and what they mean\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/\",\"name\":\"InsuranceBee Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/#\\\/schema\\\/person\\\/25d21b56419ae3d58431b36966e079bf\",\"name\":\"Kate Naqvi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g\",\"caption\":\"Kate Naqvi\"},\"url\":\"https:\\\/\\\/www.insurancebee.com\\\/blog\\\/author\\\/kate-naqvi\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cyber terms and their meanings | Cyber security terms","description":"Confused about cyber terms and their meanings? Here's InsuranceBee's glossary - your guide to understanding cybercrime terminology.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings","og_locale":"en_US","og_type":"article","og_title":"Cyber terms and their meanings | Cyber security terms","og_description":"Confused about cyber terms and their meanings? Here's InsuranceBee's glossary - your guide to understanding cybercrime terminology.","og_url":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings","og_site_name":"InsuranceBee Blog","article_published_time":"2021-01-25T11:33:03+00:00","article_modified_time":"2023-02-08T09:55:45+00:00","og_image":[{"url":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png","type":"","width":"","height":""}],"author":"Kate Naqvi","twitter_misc":{"Written by":"Kate Naqvi","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#article","isPartOf":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings"},"author":{"name":"Kate Naqvi","@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf"},"headline":"Cyber terms and what they mean","datePublished":"2021-01-25T11:33:03+00:00","dateModified":"2023-02-08T09:55:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings"},"wordCount":801,"image":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#primaryimage"},"thumbnailUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png","keywords":["business interruption insurance","cyber liability insurance","rules and regulations"],"articleSection":["Cyber liability"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings","url":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings","name":"Cyber terms and their meanings | Cyber security terms","isPartOf":{"@id":"https:\/\/www.insurancebee.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#primaryimage"},"image":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#primaryimage"},"thumbnailUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png","datePublished":"2021-01-25T11:33:03+00:00","dateModified":"2023-02-08T09:55:45+00:00","author":{"@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf"},"description":"Confused about cyber terms and their meanings? Here's InsuranceBee's glossary - your guide to understanding cybercrime terminology.","breadcrumb":{"@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#primaryimage","url":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png","contentUrl":"https:\/\/www.insurancebee.com\/blog\/wp-content\/uploads\/2021\/01\/cyber-glossary.png","width":600,"height":400},{"@type":"BreadcrumbList","@id":"https:\/\/www.insurancebee.com\/blog\/cyber-terms-and-meanings#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.insurancebee.com\/blog"},{"@type":"ListItem","position":2,"name":"Cyber terms and what they mean"}]},{"@type":"WebSite","@id":"https:\/\/www.insurancebee.com\/blog\/#website","url":"https:\/\/www.insurancebee.com\/blog\/","name":"InsuranceBee Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.insurancebee.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.insurancebee.com\/blog\/#\/schema\/person\/25d21b56419ae3d58431b36966e079bf","name":"Kate Naqvi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2df945b683e8ace226a95eaee740a2d6c6f5b81854bbc81200f437e4e55344ce?s=96&d=mm&r=g","caption":"Kate Naqvi"},"url":"https:\/\/www.insurancebee.com\/blog\/author\/kate-naqvi"}]}},"_links":{"self":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1932","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/users\/16"}],"replies":[{"embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/comments?post=1932"}],"version-history":[{"count":16,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1932\/revisions"}],"predecessor-version":[{"id":2364,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/posts\/1932\/revisions\/2364"}],"wp:attachment":[{"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/media?parent=1932"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/categories?post=1932"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.insurancebee.com\/blog\/wp-json\/wp\/v2\/tags?post=1932"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}