{"id":2266,"date":"2019-11-19T12:32:00","date_gmt":"2019-11-19T11:32:00","guid":{"rendered":"http:\/\/wtotem.com\/blog\/?p=2266"},"modified":"2020-07-21T18:07:53","modified_gmt":"2020-07-21T16:07:53","slug":"how-to-protect-your-website-from-spammers-browse-tag","status":"publish","type":"post","link":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/","title":{"rendered":"How to Protect Your Website From Spammers"},"content":{"rendered":"\n<p>It\u2019s every website administrator\u2019s nightmare. You log off for the evening only to wake up to pandemonium on your company website. Hackers have gotten ahold of key information, sending spam out from your once-trusted web address. Now it will take weeks to get things back the way they were &#8211; if you can even regain full access.<\/p>\n\n\n\n<hr class=\"wp-block-separator is-cnvs-separator-id-1595346075121\"\/>\n\n\n\n<p><br>These types of spammer attacks have been a consistent issue on the web for decades, and the problem isn\u2019t going away any time soon. Just last year,&nbsp;<a href=\"https:\/\/blog.rapid7.com\/2018\/04\/27\/drupalgeddon-vulnerability-what-is-it-are-you-impacted\/\">Drupalgeddon 2<\/a>&nbsp;threatened the hundreds of thousands of websites built on Drupal, including government sites like Whitehouse.gov.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/WHlinks.png\" ><figcaption>Whitehouse.gov. was threatened in 2018<\/figcaption><\/figure>\n\n\n\n<p><br>The common image of hackers working alone in a dingy apartment isn\u2019t totally off the mark, but more often than not, entire teams of organized criminals are now pursuing blackhat hacking with outsized budgets. Hacked websites and databases are then sold onto other criminals for illicit purposes, often with spam in mind.<\/p>\n\n\n\n<p>The good news about the state of spam in 2019 is that there are solutions. The most secure websites utilize monitoring software to ensure the highest level of protection &#8211; but even minor changes can reap greater peace of mind.<\/p>\n\n\n\n<p><br>If you\u2019re looking to make your site more secure, the following tips are a great way to start:<\/p>\n\n\n\n<ol><li><strong>Update (And Rethink) Your Passwords<\/strong><\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/password-input-field-with-padlock-security-privacy-featured-1280x720.jpg\" ><\/figure>\n\n\n\n<p>The username \u2018administrator\u2019 accounts for&nbsp;<a href=\"https:\/\/blog.rapid7.com\/2016\/03\/01\/the-attackers-dictionary\/\">nearly 50 percent<\/a>&nbsp;of websites studied in a recent overview of hackable websites, with the most common password (a single \u2018x\u2019) being used in over 5% of cases. The most common passwords &#8211; easy to guess and frequently used &#8211; are the first ones even an amateur hacker would guess during a brute force attack.<br>Even if your password is entirely unique, it probably isn\u2019t nearly as safe as you think. Cutting-edge software can guess even a complex password easily, not to mention the number of discrete monitoring hackers engage in to listen in on password entry.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\" id=\"a-good-password-is-unique-unpredictable-and-random-don-t-reuse-passwords-across-sites-if-one-database-gets-hacked-you-re-at-risk-across-the-web-modern-password-management-software-can-help-greatly-in-this-regard-\"><span id=\"a-good-password-is-unique-unpredictable-and-random-dont-reuse-passwords-across-sites-if-one-database-gets-hacked-youre-at-risk-across-the-web-modern-password-man\"><em>&#8221; A good password is unique, unpredictable, and random. Don\u2019t reuse passwords across sites &#8211; if one database gets hacked, you\u2019re at risk across the web. Modern password management software can help greatly in this regard.&#8221;<br><\/em><\/span><\/h2>\n\n\n\n<p><strong>2.&nbsp;Check Your SSL Certificate<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/free-ssltls.jpg\" ><\/figure>\n\n\n\n<p>An SSL certificate allows for a cryptographically-secure connection between website and user. Put simply, an SSL certificate ensures details entered on the site remain confidential.<\/p>\n\n\n\n<p>While SSL certificates are all but essential for credit card info and other personal data, they\u2019re widely expected on any reputable website. In fact,<em>&nbsp;<a href=\"https:\/\/neilpatel.com\/blog\/does-a-ssl-certificate-affect-your-seo-a-data-driven-answer\/\">Google ranks secure web pages<\/a><\/em>&nbsp;higher than their counterparts, even though just 1.9% of websites currently have SSL certificates.<br><br>Expect this number to rise in the near future, as more and more companies realize the importance of fully secure data. You can get ahead of the curve by making sure your website is fully secure today, before an attack happens.<\/p>\n\n\n\n<p><br><strong>3. Make Server-side Scanners Mandatory<\/strong><\/p>\n\n\n\n<p>The May 2019&nbsp;<a href=\"https:\/\/www.nytimes.com\/2019\/05\/25\/us\/nsa-hacking-tool-baltimore.html\">ransomware attacks in Baltimore<\/a>&nbsp;left the city\u2019s cyberinfrastructure offline for months. Hospitals, police stations, and other essential services were hampered by EternalBlue, a Windows exploit first discovered by the NSA &#8211; five years ago.<\/p>\n\n\n\n<p><br>Ransomware and crypto-jacking attacks are a rising threat. For WordPress users, a new ransomware variant called<a href=\"https:\/\/www.cyber.nj.gov\/threat-profiles\/ransomware-variants\/ev\">&nbsp;EV ransomware<\/a>&nbsp;specifically targets vulnerabilities in WP websites. This attack probes for weaknesses and uploads the virus once it has successfully compromised a WP website. It encrypts all existing files and replaces the home page with instructions for paying the ransom.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/jacklee@airmail.cc.uta-ransomware-Copy.jpg\" ><\/figure>\n\n\n\n<p>A means to decrypt files encrypted by the attack does not yet exist, meaning victims must pay if they want their files restored and do not have a backup. The fact that these kinds of exploits still exist makes server-side scanners essential. Any suspicious activity or unauthorized change will be quarantined immediately, keeping your website and system working in perfect order while the issue is resolved.<\/p>\n\n\n\n<p><strong>4.&nbsp;Get All-In-One Monitoring<\/strong><\/p>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/-------------.png\" ><figcaption>WebTotem security modules<\/figcaption><\/figure>\n\n\n\n<p>Algorithmically-generated passwords, up-to-date SSL certificates, antivirus software\u2026 it can all be a lot for a website owner to keep track of. That\u2019s not even to mention the necessary firewalls and sanitized input forms smart admins need to cut down on spam.<\/p>\n\n\n\n<p>We created&nbsp;<a href=\"https:\/\/wtotem.com\/sign-up\">WebTotem<\/a>&nbsp;for this exact reason. Our software provides 24\/7 monitoring, given that attacks can happen from anywhere at all hours. Our enterprise-grade firewall is included free of charge, and all of our service modules are intended to stop spam, deny hackers, and keep our users safe from whatever the dark web may throw at them.<\/p>\n\n\n\n<figure class=\"wp-block-image\"><img  decoding=\"async\"  src=\"data:image\/png;base64,iVBORw0KGgoAAAANSUhEUgAAAAEAAAABAQMAAAAl21bKAAAAA1BMVEUAAP+KeNJXAAAAAXRSTlMAQObYZgAAAAlwSFlzAAAOxAAADsQBlSsOGwAAAApJREFUCNdjYAAAAAIAAeIhvDMAAAAASUVORK5CYII=\"  alt=\"\"  class=\" pk-lazyload\"  data-pk-sizes=\"auto\"  data-pk-src=\"http:\/\/wtotem.com\/blog\/content\/images\/2019\/11\/----.png\" ><\/figure>\n\n\n\n<p>Spam isn\u2019t just a minor annoyance. If your resource is hacked and sends out spam mailings, you\u2019ll end up with a blacklisted IP address. Ignore the problem and your entire website is at risk. Yet with a bit of pre-planning and a focus on the key issues, you\u2019ll make sure you\u2019re never left vulnerable on the web. Our software can make sure you have the highest level of protection.<\/p>\n","protected":false},"excerpt":{"rendered":"It\u2019s every website administrator\u2019s nightmare. You log off for the evening only to wake up to pandemonium on&hellip;\n","protected":false},"author":2,"featured_media":2318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Website From Spammers - WebTotem<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Website From Spammers - WebTotem\" \/>\n<meta property=\"og:description\" content=\"It\u2019s every website administrator\u2019s nightmare. You log off for the evening only to wake up to pandemonium on&hellip;\" \/>\n<meta property=\"og:url\" content=\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/\" \/>\n<meta property=\"og:site_name\" content=\"WebTotem\" \/>\n<meta property=\"article:author\" content=\"https:\/\/facebook.com\/webtotem\" \/>\n<meta property=\"article:published_time\" content=\"2019-11-19T11:32:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-21T16:07:53+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1197\" \/>\n\t<meta property=\"og:image:height\" content=\"748\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"WebTotem\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"WebTotem\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/\",\"url\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/\",\"name\":\"How to Protect Your Website From Spammers - WebTotem\",\"isPartOf\":{\"@id\":\"https:\/\/wtotem.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg\",\"datePublished\":\"2019-11-19T11:32:00+00:00\",\"dateModified\":\"2020-07-21T16:07:53+00:00\",\"author\":{\"@id\":\"https:\/\/wtotem.com\/blog\/#\/schema\/person\/bdf9e3e2a58cede9824be44516122d5b\"},\"breadcrumb\":{\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage\",\"url\":\"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg\",\"contentUrl\":\"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg\",\"width\":1197,\"height\":748},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/wtotem.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Website From Spammers\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/wtotem.com\/blog\/#website\",\"url\":\"https:\/\/wtotem.com\/blog\/\",\"name\":\"WebTotem\",\"description\":\"Security Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/wtotem.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/wtotem.com\/blog\/#\/schema\/person\/bdf9e3e2a58cede9824be44516122d5b\",\"name\":\"WebTotem\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/wtotem.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/51b2616f42fbcc68aae56c96ad0ddfb5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/51b2616f42fbcc68aae56c96ad0ddfb5?s=96&d=mm&r=g\",\"caption\":\"WebTotem\"},\"description\":\"WebTotem is a SaaS which provides powerful tools for securing and monitoring your website in one place in easy and flexible way.\",\"sameAs\":[\"http:\/\/wtotem.com\",\"https:\/\/facebook.com\/webtotem\"],\"url\":\"https:\/\/wtotem.com\/blog\/author\/victoria-umanska\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Your Website From Spammers - WebTotem","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Website From Spammers - WebTotem","og_description":"It\u2019s every website administrator\u2019s nightmare. You log off for the evening only to wake up to pandemonium on&hellip;","og_url":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/","og_site_name":"WebTotem","article_author":"https:\/\/facebook.com\/webtotem","article_published_time":"2019-11-19T11:32:00+00:00","article_modified_time":"2020-07-21T16:07:53+00:00","og_image":[{"width":1197,"height":748,"url":"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg","type":"image\/jpeg"}],"author":"WebTotem","twitter_card":"summary_large_image","twitter_misc":{"Written by":"WebTotem","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/","url":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/","name":"How to Protect Your Website From Spammers - WebTotem","isPartOf":{"@id":"https:\/\/wtotem.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage"},"image":{"@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage"},"thumbnailUrl":"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg","datePublished":"2019-11-19T11:32:00+00:00","dateModified":"2020-07-21T16:07:53+00:00","author":{"@id":"https:\/\/wtotem.com\/blog\/#\/schema\/person\/bdf9e3e2a58cede9824be44516122d5b"},"breadcrumb":{"@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#primaryimage","url":"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg","contentUrl":"https:\/\/wtotem.com\/blog\/wp-content\/uploads\/2019\/11\/Frame-4.jpg","width":1197,"height":748},{"@type":"BreadcrumbList","@id":"https:\/\/wtotem.com\/blog\/how-to-protect-your-website-from-spammers-browse-tag\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/wtotem.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Website From Spammers"}]},{"@type":"WebSite","@id":"https:\/\/wtotem.com\/blog\/#website","url":"https:\/\/wtotem.com\/blog\/","name":"WebTotem","description":"Security Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/wtotem.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/wtotem.com\/blog\/#\/schema\/person\/bdf9e3e2a58cede9824be44516122d5b","name":"WebTotem","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/wtotem.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/51b2616f42fbcc68aae56c96ad0ddfb5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/51b2616f42fbcc68aae56c96ad0ddfb5?s=96&d=mm&r=g","caption":"WebTotem"},"description":"WebTotem is a SaaS which provides powerful tools for securing and monitoring your website in one place in easy and flexible way.","sameAs":["http:\/\/wtotem.com","https:\/\/facebook.com\/webtotem"],"url":"https:\/\/wtotem.com\/blog\/author\/victoria-umanska\/"}]}},"_links":{"self":[{"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/posts\/2266"}],"collection":[{"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/comments?post=2266"}],"version-history":[{"count":3,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/posts\/2266\/revisions"}],"predecessor-version":[{"id":2331,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/posts\/2266\/revisions\/2331"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/media\/2318"}],"wp:attachment":[{"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/media?parent=2266"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/categories?post=2266"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/wtotem.com\/blog\/wp-json\/wp\/v2\/tags?post=2266"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}