{"id":2200,"date":"2016-03-12T09:01:37","date_gmt":"2016-03-12T13:01:37","guid":{"rendered":"http:\/\/162.144.41.148\/~msinc\/__production\/website\/?p=2200"},"modified":"2016-05-13T06:58:20","modified_gmt":"2016-05-13T10:58:20","slug":"laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry","status":"publish","type":"post","link":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/","title":{"rendered":"Laptop &#038; Mobile Device Risks, Mitigation In The Health Care Industry"},"content":{"rendered":"<p><em>Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of inefficient security in your health care organization and what your company can do to combat it.<\/em><\/p>\n<p>&nbsp;<\/p>\n<p><strong>Alpharetta, GA<\/strong> &#8211; With the details and implications of the PRISM program now public and recent events between Apple and the FBI hot topics around water coolers across the country, the presence of privacy and the security of data is in the news more than ever before. Now a <a href=\"https:\/\/oag.ca.gov\/breachreport2016\">new report<\/a> from California Attorney General Kamala Harris<a href=\"#_ftn1\" name=\"_ftnref1\">[1]<\/a> has exposed startling and consistent weaknesses among health care organizations\u2019 security. Jann\u2019s experience confirms the report\u2019s summary: Health care organizations <em>must<\/em> do a better job at securing sensitive patient from malware and hacking, physical breaches, and errors that result in breaches. Find out how to help your organization avoid a breech that could sink your company.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Scope of the Health Care Security Challenge: By The Numbers.<\/strong><\/p>\n<ul>\n<li>The records for <strong>24 million<\/strong> residents in a single state were breached according to the report, representing a nearly <strong>6x<\/strong> increase in a single year.<\/li>\n<li><strong>55%<\/strong> of compromised records in the health care sector were the result of a failure to encrypt data.<\/li>\n<li>Roughly <strong>50%<\/strong> of health care breaches came secondary to lost or stolen equipment, typically laptops.<\/li>\n<li>Hacking remains a major threat to security of sensitive data, including social security numbers and medical records. Malware and hacking breaches are on the rise as electronic medical record systems grow in popularity.<\/li>\n<li>Small businesses remain the most susceptible to hacking and malware attacks, as well as breaches due to physical loss. The medical industry has the highest percent of breaches due to physical loss.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<div id=\"attachment_2205\" style=\"width: 779px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2205\" class=\"wp-image-2205 size-full\" src=\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_secuirty_medicus2.jpg\" alt=\"Image: Security Breaches by type from the 2016 California report | Mobile &amp; Laptop Device Risks &amp; Mitigation In The Health Care Industry - Medicus Solutions, Inc.\" width=\"769\" height=\"312\" srcset=\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_secuirty_medicus2.jpg 769w, http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_secuirty_medicus2-300x121.jpg 300w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><p id=\"caption-attachment-2205\" class=\"wp-caption-text\"><strong>Source:<\/strong> California Data Breach Report, February 2016<\/p><\/div>\n<p>&nbsp;<\/p>\n<p><strong>The Real Costs to Data Breaches Health Care Entities &amp; Individuals<\/strong><\/p>\n<p>The significance and impact of these data breaches on both individuals and medical practices cannot be understated. For practices, data breaches not only impose financial, reputational, business opportunity penalties and costs, they also threaten critical infrastructure. For the individual, the impact hits closer to home: research from Javelin Strategy &amp; Research<a href=\"#_ftn2\" name=\"_ftnref1\">[2]<\/a> notes that <strong>67% <\/strong>of victims of data breaches are also victims of fraud. The stakes are high for all parties involved and the need for strong security couldn&#8217;t be higher. On May 5, 2015, UCLA Health concluded that a hacker accessed parts of their network that contained the addresses, DOB&#8217;s, social security numbers and medical records of 4.5 million individuals. The data was not encrypted<a href=\"#_ftn3\" name=\"_ftnref2\">[3]<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Mobile Device &amp; Laptop Security In Health Care &#8211; The Biggest Threat<\/strong><\/p>\n<p>Security breaches resulting from the theft or loss of unencrypted devices represents one of the single biggest threats to the health care sector. In fact, physical breaches represent more than half of all security breaches in this sector according to the report, accounting for 2.8 million records breached in one state alone. \u201cA large part of these losses came from data stored on laptops and USB drives,\u201d Jann said. \u201cMobility coupled with a lack of security have resulted in some of the biggest breaches we\u2019ve seen to date and remains a huge threat to small business in particular, as they tend to not have robust security features installed.\u201d<\/p>\n<p>&nbsp;<\/p>\n<p><strong>What Your Health Care Organization Can Do To Better Protect Data On Mobile Devices.<\/strong><\/p>\n<ol>\n<li><strong>Implement proper security protocols in your organization. <\/strong>With hackers breaking into healthcare networks, hackers can&#8217;t be allowed to access sensitive unencrypted data. The first goal should be to make sure that your organization is functioning within NIST&#8217;s guidelines for encryption compliance. There is an important &#8220;safe harbor&#8221; provision written into the 2009 HITECH Act&#8217;s interim final breach notification rule<a href=\"#_ftn4\" name=\"_ftnref1\">[4]<\/a> where if your company experiences a breach that affects more than 500 people, you can be exempt from reporting the incident if your encryption falls within those required guidelines.<\/li>\n<\/ol>\n<ol start=\"2\">\n<li><strong>Analyze the environment to understand breach risks.<\/strong> By reviewing the life cycle of how data enters and exists your companies walls, you gives your IT professionals the opportunity to identify the weakest points in the security of the organization and form strategies to address them before problems occur. Do you know what your users are doing with laptops that have access to sensitive information on and off company premises?<\/li>\n<\/ol>\n<ol start=\"3\">\n<li><strong>Evaluate enterprise security controls and encryption needs.<\/strong> Not everyone needs access to every sensitive document and folder. Identify who needs access to what and encrypt files and folders as needed.<\/li>\n<\/ol>\n<ol start=\"4\">\n<li><strong>Implement stronger security for your cloud-stored data.<\/strong> Most cloud services used by health care organizations are often times not thoroughly vetted for proper security before being used. Cloud storage data breaches can happen and when they do, it is essential that your organization&#8217;s data is safe.<\/li>\n<\/ol>\n<ol start=\"5\">\n<li><strong>Staff education. <\/strong>Training staff to understand and be disciplined in its use of security protocols is essential to any effective security system. Make sure your personnel understands the necessity to follow all rules and regulations set forth by your IT team and commits to following them fully.<\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>At Medicus, Jann and his team use WinMagic<a href=\"#_ftn5\" name=\"_ftnref2\">[5]<\/a> (http:\/\/www.winmagic.com) and recommend it to their medical IT clients as the preferred method of securing sensitive files on laptops and mobile devices. \u201cThis service gives medical IT administrators centralized control over all encryption keys for the entire practice, including multiple locations, removing that responsibility from the cloud providers and giving it back to your practice where it belongs,\u201d urges Jann. \u201cIn short, it ensures that all files are encrypted on the mobile or desktop device before ever being moved to the cloud, thus eliminating the risk of data breaches on the laptop\/mobile device or in the cloud. Without the encryption key, data on said devices or cloud services would be useless to hackers. We highly recommend it.\u201d<\/p>\n<p>No matter what service you decide to use, the important take-away is that your health care organization implement essential encryption systems to keep your sensitive data safe. For devices that represent a natural threat for physical loss like laptops, implementing encryption of work-related folders, developing and implementing a security plan, and educating staff in the proper use of said systems are essential to bullet-proof security. For implementation, support, and related services, our team at Medicus Solutions is ready to assist your organization and maximize its security potential. We can quickly evaluate the quality of your current security solutions, test your backups and networks, scan or vulnerabilities, implement new secure systems and services, and much more. If your organization would like a full evaluation from a team with more than 20 years of experience in IT security services, we encourage you to contact us today.<\/p>\n<p>&#8212;<\/p>\n<p><strong>About Medicus Solutions:<\/strong><\/p>\n<p>Medicus Solutions, LLC (<a title=\"Medicus Home\" href=\"http:\/\/162.241.140.166\/~msinc\/\">http:\/\/162.241.140.166\/~msinc\/<\/a>) is an Alpharetta, GA based company that specializes in providing medical IT support management to improve the efficiency, security and stability of your company&#8217;s operations. Medicus offers a range of IT services that work both independently and in unison to ensure your company operates securely, seamlessly and efficiently. Featuring secure email and backup services, virtual hosting services, HIPAA-approved file encryption systems, and much more. For more information about Medicus Solutions, please call our main offices in Alpharetta at 678-495-5900 or visit us at our website.<\/p>\n<p>Medicus Solutions writes about news, technologies, and educational topics that are defining the future of health care IT solutions and security issues at its blog: http:\/\/162.241.140.166\/~msinc\/blog\/<\/p>\n<p><strong>Source:<\/strong> Medicus Solutions, LLC.<\/p>\n<p>###<\/p>\n<p><a href=\"#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0<a href=\"http:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/laws-regulations\/final-rule-update\/HITECH\/index.html\u00a0\" target=\"_blank\">http:\/\/www.hhs.gov\/hipaa\/for-professionals\/breach-notification\/laws-regulations&#8230;<\/a><br \/>\n<a href=\"#_ftnref2\" name=\"_ftn2\">[2]<\/a> <a href=\"http:\/\/www.winmagic.com\/products\/cloud-file-encryption-software-key-management\" target=\"_blank\">http:\/\/www.winmagic.com\/products\/cloud-file-encryption-software-key-management<\/a><br \/>\n<a href=\"#_ftnref3\" name=\"_ftn3\">[3]<\/a> <a href=\"https:\/\/www.javelinstrategy.com\/fraud-and-security\" target=\"_blank\">https:\/\/www.javelinstrategy.com\/fraud-and-security<\/a><br \/>\n<a href=\"#_ftnref4\" name=\"_ftn4\">[4]<\/a> <a href=\"http:\/\/www.latimes.com\/business\/la-fi-ucla-medical-data-20150717-story.html\" target=\"_blank\">http:\/\/www.latimes.com\/business\/la-fi-ucla-medical-data-20150717-story.html<\/a><br \/>\n<a href=\"#_ftnref5\" name=\"_ftn5\">[5]<\/a> <a href=\"https:\/\/oag.ca.gov\/breachreport2016\" target=\"_blank\">https:\/\/oag.ca.gov\/breachreport2016<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of inefficient security in your health care organization and what your company can do to combat it. &nbsp; Alpharetta, GA &#8211; With the details and implications of the PRISM program now public and recent events between Apple and the FBI hot topics around [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":2204,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[8,11],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Mobile Device Risks, Mitigation In The Health Care Industry - Medicus<\/title>\n<meta name=\"description\" content=\"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Device Risks, Mitigation In The Health Care Industry - Medicus\" \/>\n<meta property=\"og:description\" content=\"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.\" \/>\n<meta property=\"og:url\" content=\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/\" \/>\n<meta property=\"og:site_name\" content=\"Medicus Solutions, LLC\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-12T13:01:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-05-13T10:58:20+00:00\" \/>\n<meta property=\"og:image\" content=\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"718\" \/>\n\t<meta property=\"og:image:height\" content=\"370\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Niche Labs\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Niche Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/\",\"name\":\"Mobile Device Risks, Mitigation In The Health Care Industry - Medicus\",\"isPartOf\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#website\"},\"primaryImageOfPage\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage\"},\"image\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage\"},\"thumbnailUrl\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg\",\"datePublished\":\"2016-03-12T13:01:37+00:00\",\"dateModified\":\"2016-05-13T10:58:20+00:00\",\"author\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/0997e792bb8296814a3ddc6936c2295f\"},\"description\":\"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.\",\"breadcrumb\":{\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg\",\"contentUrl\":\"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg\",\"width\":718,\"height\":370,\"caption\":\"Image: Keyboard covered in chains | Mobile & Laptop Device Risks & Mitigation In The Health Care Industry - Medicus Solutions, Inc.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"http:\/\/162.241.140.166\/~msinc\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Laptop &#038; Mobile Device Risks, Mitigation In The Health Care Industry\"}]},{\"@type\":\"WebSite\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#website\",\"url\":\"http:\/\/162.241.140.166\/~msinc\/\",\"name\":\"Medicus Solutions, LLC\",\"description\":\"Atlanta Healthcare Computer Support - MSP\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"http:\/\/162.241.140.166\/~msinc\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/0997e792bb8296814a3ddc6936c2295f\",\"name\":\"Niche Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/image\/\",\"url\":\"http:\/\/1.gravatar.com\/avatar\/47b7bba5c7506013e1c55c2e0eefd92f?s=96&d=mm&r=g\",\"contentUrl\":\"http:\/\/1.gravatar.com\/avatar\/47b7bba5c7506013e1c55c2e0eefd92f?s=96&d=mm&r=g\",\"caption\":\"Niche Labs\"},\"url\":\"http:\/\/162.241.140.166\/~msinc\/author\/nichelabs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Device Risks, Mitigation In The Health Care Industry - Medicus","description":"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Device Risks, Mitigation In The Health Care Industry - Medicus","og_description":"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.","og_url":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/","og_site_name":"Medicus Solutions, LLC","article_published_time":"2016-03-12T13:01:37+00:00","article_modified_time":"2016-05-13T10:58:20+00:00","og_image":[{"width":718,"height":370,"url":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg","type":"image\/jpeg"}],"author":"Niche Labs","twitter_misc":{"Written by":"Niche Labs","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/","url":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/","name":"Mobile Device Risks, Mitigation In The Health Care Industry - Medicus","isPartOf":{"@id":"http:\/\/162.241.140.166\/~msinc\/#website"},"primaryImageOfPage":{"@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage"},"image":{"@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage"},"thumbnailUrl":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg","datePublished":"2016-03-12T13:01:37+00:00","dateModified":"2016-05-13T10:58:20+00:00","author":{"@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/0997e792bb8296814a3ddc6936c2295f"},"description":"Mike Jann of medical IT support management firm Medicus Solutions analyzes\u00a0the impact of poor security in your health care org and what you can do about it.","breadcrumb":{"@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#primaryimage","url":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg","contentUrl":"http:\/\/162.241.140.166\/~msinc\/wp-content\/uploads\/mobile_it_security_medicus1.jpg","width":718,"height":370,"caption":"Image: Keyboard covered in chains | Mobile & Laptop Device Risks & Mitigation In The Health Care Industry - Medicus Solutions, Inc."},{"@type":"BreadcrumbList","@id":"http:\/\/162.241.140.166\/~msinc\/press-release\/laptop-mobile-device-risks-and-mitigation-in-the-health-care-industry\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"http:\/\/162.241.140.166\/~msinc\/"},{"@type":"ListItem","position":2,"name":"Laptop &#038; Mobile Device Risks, Mitigation In The Health Care Industry"}]},{"@type":"WebSite","@id":"http:\/\/162.241.140.166\/~msinc\/#website","url":"http:\/\/162.241.140.166\/~msinc\/","name":"Medicus Solutions, LLC","description":"Atlanta Healthcare Computer Support - MSP","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"http:\/\/162.241.140.166\/~msinc\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/0997e792bb8296814a3ddc6936c2295f","name":"Niche Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"http:\/\/162.241.140.166\/~msinc\/#\/schema\/person\/image\/","url":"http:\/\/1.gravatar.com\/avatar\/47b7bba5c7506013e1c55c2e0eefd92f?s=96&d=mm&r=g","contentUrl":"http:\/\/1.gravatar.com\/avatar\/47b7bba5c7506013e1c55c2e0eefd92f?s=96&d=mm&r=g","caption":"Niche Labs"},"url":"http:\/\/162.241.140.166\/~msinc\/author\/nichelabs\/"}]}},"_links":{"self":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2200"}],"collection":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/comments?post=2200"}],"version-history":[{"count":5,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2200\/revisions"}],"predecessor-version":[{"id":2370,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/posts\/2200\/revisions\/2370"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/media\/2204"}],"wp:attachment":[{"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/media?parent=2200"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/categories?post=2200"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/162.241.140.166\/~msinc\/wp-json\/wp\/v2\/tags?post=2200"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}