	{"id":47392,"date":"2015-10-28T08:58:35","date_gmt":"2015-10-28T15:58:35","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=47392"},"modified":"2015-10-28T08:58:35","modified_gmt":"2015-10-28T15:58:35","slug":"make-your-passwords-hard-to-hack","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/","title":{"rendered":"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-5393\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/INTG_Passwords_08a_AC.jpg\" alt=\"is computer easily hackable\" width=\"560\" height=\"450\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/INTG_Passwords_08a_AC.jpg 560w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/INTG_Passwords_08a_AC-150x120.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/INTG_Passwords_08a_AC-300x241.jpg 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/07\/INTG_Passwords_08a_AC-100x80.jpg 100w\" sizes=\"(max-width: 560px) 100vw, 560px\" \/><\/p>\n<address><em>Originally published on\u00a0<a href=\"https:\/\/www.fosi.org\" target=\"_blank\">Family Online Safety Institute<\/a>.<\/em><\/address>\n<p>All of the rules and requirements around creating a password can get exhausting. Sometimes you need a symbol other times just a mix of upper and lowercase letters. Why can\u2019t we just make it whatever we want, something easy like abc123? Ideally, the freedom to create simple passwords would be nice but in a world where we literally do everything online, safety and confidentiality hinge on a secure password.<\/p>\n<h3>What makes a strong password<\/h3>\n<p>A strong password is one that is unique to you. One that wouldn\u2019t be easy for anyone else to guess. More importantly it isn\u2019t easy for hackers to crack. This requires a combination of lowercase and uppercase characters, symbols and numbers. It is suggested that your password be at least eight characters long, contain a combination of letters, numbers and symbols; a mixture of upper and lowercase letters and be associated with your name or username. If you really want to set the bar high, try not to include any complete words in your passwords.<\/p>\n<h3>Tips for avoiding having your password hacked<\/h3>\n<ol>\n<li><strong>Don\u2019t login using your password on a public wifi\u2026.even at Starbucks.<\/strong> These networks are in place for our convenience but are not secure. Using any site that requires you to type in a password while connected to an unsecure network puts you at risk. You might be thinking that you don\u2019t really care if your twitter account gets hacked, but your twitter password may provide clues to other passwords you have protecting more serious accounts such as banking. Which leads perfectly to the next tip&#8230;<\/li>\n<li><strong>Do not repeat the same password across multiple sites.<\/strong> I understand it is hard to juggle multiple passwords and as tempting as it is to just stick with one password for all sites it just isn\u2019t smart. Also do not think a password is different just because you juggle some numbers around, add a character or change what letter is uppercase. aBC132 is the same as abC123.<\/li>\n<li><strong>Avoid using names in your passwords or any information that can be found on your social sites.<\/strong> It might be tempting to you use your spouse&#8217;s name with your wedding date as your password but this information is easy for anyone to guess viewing your social media profile. Same goes for pets, kids etc. Avoid using any information that can be found online attached to your identity.<\/li>\n<li><strong>Try not to create any record of your passwords.<\/strong> After learning that you need to have multiple and different passwords, it might be hard to fathom how to remember which password is tied to which account without some sort of record. If you can\u2019t commit this information to memory (I have trouble with this) and need to have some sort of record than physically write it down, I suggest in a notebook, and keep it in a safe place. Never make a digital copy of your passwords. Even an Excel Spreadsheet saved on your hard drive, and not to a cloud database, is a risk. Also, if you choose to write down your passwords try to create some sort of shorthand that would be hard for anyone other than yourself to understand.<\/li>\n<li><strong>Be careful who you share your passwords with.<\/strong> In most cases share your passwords with no one, but if you for any reason you need to share your passwords with a spouse or financial advisor make sure you ask how they plan on storing the password. It is your right to request your password not to be saved in any sort of database. Ask as many questions as you need to feel safe before ever sharing your password. Again, your password is safest when you keep it to yourself. If you ever have to divulge your password to a sales associate or customer service rep. change your password after they are done working within your account.<\/li>\n<\/ol>\n<p>Also remember to change your passwords about twice a year or at the first sign of any unusual behavior within any of your accounts. If your email account was hacked it would most likely be wise to do a total password overhaul on all platforms.<\/p>\n<p>Being able to do everything online is so convenient. But along with the luxury comes responsibility and risk. Take responsibility to protect yourself and create passwords that are strong. There are <a href=\"https:\/\/www.microsoft.com\/es-xl\/security\/pc-security\/password-checker.aspx\" target=\"_blank\">tools<\/a> available to help you test the strength of your passwords.<\/p>\n<address><em>Originally published on\u00a0<a href=\"https:\/\/www.fosi.org\" target=\"_blank\">Family Online Safety Institute<\/a>.<\/em><\/address>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.<\/p>\n","protected":false},"author":67,"featured_media":35584,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[913,353,96,106],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-28T15:58:35+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Augusta Nissly\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg\",\"width\":400,\"height\":260,\"caption\":\"Easily hackable passwords\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/\",\"name\":\"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage\"},\"datePublished\":\"2015-10-28T15:58:35+00:00\",\"dateModified\":\"2015-10-28T15:58:35+00:00\",\"description\":\"It\\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/9811b3635f9a32f8353217f8c7f47644\"},\"headline\":\"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack\",\"datePublished\":\"2015-10-28T15:58:35+00:00\",\"dateModified\":\"2015-10-28T15:58:35+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage\"},\"wordCount\":763,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg\",\"keywords\":[\"Online Safety\",\"Password Security\",\"Passwords\",\"Privacy\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/9811b3635f9a32f8353217f8c7f47644\",\"name\":\"Augusta Nissly\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/21e09c9f300a6fd3df5da1e030bec83c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/21e09c9f300a6fd3df5da1e030bec83c?s=96&d=mm&r=g\",\"caption\":\"Augusta Nissly\"},\"description\":\"Augusta Nissly is the Program Coordinator for FOSI's Good Digital Parenting. In this role, Augusta uses her creative vision to help build awareness and grow the audience of GDP. She manages all of the social media accounts and assists in content creation and management. Augusta graduated from Millersville University of Pennsylvania with a Bachelor of Science in Communications: Public Relations and also minored in English: Print Journalism. Previously, Augusta managed social media accounts and online content for a D.C.\/Baltimore based law firm. Follow FOSI.org on Twitter at @FOSI.\",\"sameAs\":[\"https:\/\/www.fosi.org\/people\/augusta-nissly\/\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/augusta-nissly\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/","og_locale":"en_US","og_type":"article","og_title":"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack - The Mac Security Blog","og_description":"It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.","og_url":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-10-28T15:58:35+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Augusta Nissly","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg","width":400,"height":260,"caption":"Easily hackable passwords"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/","name":"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage"},"datePublished":"2015-10-28T15:58:35+00:00","dateModified":"2015-10-28T15:58:35+00:00","description":"It\u2019s important to create secure passwords that are hard to hack. Here are 5 tips to stay safe online and avoid having your passwords hacked.","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/9811b3635f9a32f8353217f8c7f47644"},"headline":"Stay Safe Online: 5 Tips to Make Your Passwords Hard to Hack","datePublished":"2015-10-28T15:58:35+00:00","dateModified":"2015-10-28T15:58:35+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#webpage"},"wordCount":763,"commentCount":2,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg","keywords":["Online Safety","Password Security","Passwords","Privacy"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/make-your-passwords-hard-to-hack\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/9811b3635f9a32f8353217f8c7f47644","name":"Augusta Nissly","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/21e09c9f300a6fd3df5da1e030bec83c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/21e09c9f300a6fd3df5da1e030bec83c?s=96&d=mm&r=g","caption":"Augusta Nissly"},"description":"Augusta Nissly is the Program Coordinator for FOSI's Good Digital Parenting. In this role, Augusta uses her creative vision to help build awareness and grow the audience of GDP. She manages all of the social media accounts and assists in content creation and management. Augusta graduated from Millersville University of Pennsylvania with a Bachelor of Science in Communications: Public Relations and also minored in English: Print Journalism. Previously, Augusta managed social media accounts and online content for a D.C.\/Baltimore based law firm. Follow FOSI.org on Twitter at @FOSI.","sameAs":["https:\/\/www.fosi.org\/people\/augusta-nissly\/"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/augusta-nissly\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2012\/08\/easily-hackable-passwords1.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cko","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/47392"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/67"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=47392"}],"version-history":[{"count":19,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/47392\/revisions"}],"predecessor-version":[{"id":47449,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/47392\/revisions\/47449"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35584"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=47392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=47392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=47392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}