{"id":7197,"date":"2022-10-19T00:38:19","date_gmt":"2022-10-19T00:38:19","guid":{"rendered":"https:\/\/diversitynewsmagazine.com\/?p=7197"},"modified":"2022-10-19T16:56:11","modified_gmt":"2022-10-19T16:56:11","slug":"sonicwall-vpn-two-factor-authentication","status":"publish","type":"post","link":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/","title":{"rendered":"Sonicwall VPN Two factor Authentication: Important step to Online Security"},"content":{"rendered":"<p>With the COVID-19 pandemic came a rise in companies turning to remote work. This allowed employees to work from anywhere in the world while still being able to access their company data. Companies were prompted to think of more secure ways to keep their private information safe. However, the majority of companies are only protecting certain departments with multi-factor authentication rather than protecting every single employee with the <a href=\"https:\/\/www.logintc.com\/docs\/connectors\/sonicwall-sra\/\" target=\"_blank\" rel=\"noopener\">Sonicwall Global VPN Client Two-Factor Authentication<\/a>.<\/p>\n<p>Cyberattacks are happening on a more frequent basis and some companies still believe that they won\u2019t get hacked because their business is a prime target and they have an \u201cit won\u2019t happen to me mentality\u201d. This is why some companies only protect the departments with the most sensitive information but what they don\u2019t realize is that they\u2019re still leaving vulnerabilities in the company. Companies may not realize that there are dangers to leaving vulnerabilities when it comes to security and that even if just one user is unprotected then it can lead to a serious data breach.<\/p>\n<p>All users, regardless if they have MFA protection or not, will have access to your company server, network connection, etc. and leaving just one user without MFA will increase your risk of a data breach.<\/p>\n<h2>What is Two-Factor Authentication?<\/h2>\n<p>Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user&#8217;s login credentials. Two factor authentication is that extra layer of protection beyond the username and password and is usually a combination of two of the following:<\/p>\n<ul>\n<li>Something you know: (password or PIN number)<\/li>\n<li>Something you have: (phone, or authenticator app)<\/li>\n<li>Something you are: (fingerprint or facial recognition)<\/li>\n<\/ul>\n<p>Two-factor authentication does have a longer log-in process but it\u2019s recommended by cybersecurity experts to enable 2FA wherever possible. This can include email accounts, password managers, social media applications, cloud storage, and more.<\/p>\n<h3>Why You Need 2FA<\/h3>\n<p>In today\u2019s world, it\u2019s crucial that you are not solely relying on passwords alone. You never want to rely on any single method for comprehensive security protection. Implementing two-factor authentication is the first step to <a href=\"https:\/\/www.travelers.com\/resources\/business-topics\/cyber-security\/5-ways-to-help-protect-company-data\" target=\"_blank\" rel=\"noopener\">securing your company data<\/a>.<\/p>\n<p>Your password is not strong enough to protect against <a href=\"https:\/\/diversitynewsmagazine.com\/internet-threats-and-the-role-of-internet-security\/\" target=\"_blank\" rel=\"noopener\">cyber attacks<\/a>. When you\u2019re using two-factor authentication you\u2019re protecting yourself from attacks such as brute force attacks or password spraying where hackers try a list of the most common passwords to easily crack weak passwords. Hackers will also try various phishing attacks to gain access to an account. A phishing attack is a type of social engineering scam that cybercriminals use to impersonate a business or trusted contact in order to trick the user into revealing their personal information.<\/p>\n<p>Spyware is another type of attack that cybercriminals use to gain access to personal information. This is also known as keylogging which can discreetly record everything you type, including usernames and passwords, and send it back to the hackers who secretly installed the malware on your device.<\/p>\n<p>While it may seem like only protecting your top key assets with MFA is a good idea that\u2019ll save you money, it\u2019s actually harmful for your business in the long run and can cost a lot more than you think. <a href=\"https:\/\/www.visma.com\/blog\/what-is-2fa-two-factor-authentication\/\" target=\"_blank\" rel=\"noopener\">Two-factor authentication<\/a> is the best way to ensure your company is fully protected against cyber threats and attacks. There are plenty of affordable options for MFA solutions which makes protecting every single user more feasible so you won\u2019t have to pick and choose who is protected and who isn\u2019t. The more you can educate yourself and your employees of the dangers of not having a multifactor authentication system in place, the better equipped you will be to handle security within your company.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With the COVID-19 pandemic came a rise in companies turning to remote work. This allowed employees to work from anywhere in the world while still being able to access their company data. Companies were prompted to think of more secure ways to keep their private information safe. However, the majority of companies are only protecting<\/p>\n","protected":false},"author":4,"featured_media":7207,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[5],"tags":[],"class_list":{"0":"post-7197","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-tech"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Sonicwall VPN Two factor Authentication: Step to Online Security<\/title>\n<meta name=\"description\" content=\"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user&#039;s login credentials.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Sonicwall VPN Two factor Authentication: Step to Online Security\" \/>\n<meta property=\"og:description\" content=\"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user&#039;s login credentials.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"Diversity News Magazine\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DiversityNewsMagazineOfficial\/\" \/>\n<meta property=\"article:published_time\" content=\"2022-10-19T00:38:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-10-19T16:56:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"525\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sarah John\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@DiversityNewsM\" \/>\n<meta name=\"twitter:site\" content=\"@DiversityNewsM\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah John\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\"},\"author\":{\"name\":\"Sarah John\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/1bfc3f9ca41c36d79d14911952e22986\"},\"headline\":\"Sonicwall VPN Two factor Authentication: Important step to Online Security\",\"datePublished\":\"2022-10-19T00:38:19+00:00\",\"dateModified\":\"2022-10-19T16:56:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\"},\"wordCount\":637,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg\",\"articleSection\":[\"Tech\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\",\"url\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\",\"name\":\"Sonicwall VPN Two factor Authentication: Step to Online Security\",\"isPartOf\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg\",\"datePublished\":\"2022-10-19T00:38:19+00:00\",\"dateModified\":\"2022-10-19T16:56:11+00:00\",\"description\":\"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user's login credentials.\",\"breadcrumb\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage\",\"url\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg\",\"contentUrl\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg\",\"width\":800,\"height\":525,\"caption\":\"Two factor Authentication\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/diversitynewsmagazine.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Sonicwall VPN Two factor Authentication: Important step to Online Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#website\",\"url\":\"https:\/\/diversitynewsmagazine.com\/\",\"name\":\"Diversity News Magazine\",\"description\":\"Lifestyle Without Limits\",\"publisher\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/diversitynewsmagazine.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#organization\",\"name\":\"Diversity News Magazine\",\"url\":\"https:\/\/diversitynewsmagazine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2019\/10\/website-DMN1.png\",\"contentUrl\":\"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2019\/10\/website-DMN1.png\",\"width\":995,\"height\":322,\"caption\":\"Diversity News Magazine\"},\"image\":{\"@id\":\"https:\/\/diversitynewsmagazine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/DiversityNewsMagazineOfficial\/\",\"https:\/\/x.com\/DiversityNewsM\",\"https:\/\/www.instagram.com\/diversitynewsmagazineofficial\/\",\"https:\/\/www.pinterest.com\/diversitynewsmagazine\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/1bfc3f9ca41c36d79d14911952e22986\",\"name\":\"Sarah John\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/fd91685c57f3a87a779fd9a04d1c917065268fbc260d20f51f19e9c8a6e37153?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/fd91685c57f3a87a779fd9a04d1c917065268fbc260d20f51f19e9c8a6e37153?s=96&r=g\",\"caption\":\"Sarah John\"},\"description\":\"Sarah John is a writer at Diversity News Magazine, covering a wide range of topics including lifestyle, entertainment, health, and current events. Passionate about sharing informative and engaging content, Sarah aims to inspire readers through stories that celebrate diversity and positivity.\",\"url\":\"https:\/\/diversitynewsmagazine.com\/author\/sarah\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Sonicwall VPN Two factor Authentication: Step to Online Security","description":"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user's login credentials.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Sonicwall VPN Two factor Authentication: Step to Online Security","og_description":"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user's login credentials.","og_url":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/","og_site_name":"Diversity News Magazine","article_publisher":"https:\/\/www.facebook.com\/DiversityNewsMagazineOfficial\/","article_published_time":"2022-10-19T00:38:19+00:00","article_modified_time":"2022-10-19T16:56:11+00:00","og_image":[{"width":800,"height":525,"url":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg","type":"image\/jpeg"}],"author":"Sarah John","twitter_card":"summary_large_image","twitter_creator":"@DiversityNewsM","twitter_site":"@DiversityNewsM","twitter_misc":{"Written by":"Sarah John","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/"},"author":{"name":"Sarah John","@id":"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/1bfc3f9ca41c36d79d14911952e22986"},"headline":"Sonicwall VPN Two factor Authentication: Important step to Online Security","datePublished":"2022-10-19T00:38:19+00:00","dateModified":"2022-10-19T16:56:11+00:00","mainEntityOfPage":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/"},"wordCount":637,"commentCount":0,"publisher":{"@id":"https:\/\/diversitynewsmagazine.com\/#organization"},"image":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg","articleSection":["Tech"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/","url":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/","name":"Sonicwall VPN Two factor Authentication: Step to Online Security","isPartOf":{"@id":"https:\/\/diversitynewsmagazine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg","datePublished":"2022-10-19T00:38:19+00:00","dateModified":"2022-10-19T16:56:11+00:00","description":"Two-factor authentication is designed to prevent an unauthorized user from gaining access to an account even if they managed to steal a user's login credentials.","breadcrumb":{"@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#primaryimage","url":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg","contentUrl":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2022\/10\/two-factor-authentication.jpg","width":800,"height":525,"caption":"Two factor Authentication"},{"@type":"BreadcrumbList","@id":"https:\/\/diversitynewsmagazine.com\/sonicwall-vpn-two-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/diversitynewsmagazine.com\/"},{"@type":"ListItem","position":2,"name":"Sonicwall VPN Two factor Authentication: Important step to Online Security"}]},{"@type":"WebSite","@id":"https:\/\/diversitynewsmagazine.com\/#website","url":"https:\/\/diversitynewsmagazine.com\/","name":"Diversity News Magazine","description":"Lifestyle Without Limits","publisher":{"@id":"https:\/\/diversitynewsmagazine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/diversitynewsmagazine.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/diversitynewsmagazine.com\/#organization","name":"Diversity News Magazine","url":"https:\/\/diversitynewsmagazine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/diversitynewsmagazine.com\/#\/schema\/logo\/image\/","url":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2019\/10\/website-DMN1.png","contentUrl":"https:\/\/diversitynewsmagazine.com\/wp-content\/uploads\/2019\/10\/website-DMN1.png","width":995,"height":322,"caption":"Diversity News Magazine"},"image":{"@id":"https:\/\/diversitynewsmagazine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DiversityNewsMagazineOfficial\/","https:\/\/x.com\/DiversityNewsM","https:\/\/www.instagram.com\/diversitynewsmagazineofficial\/","https:\/\/www.pinterest.com\/diversitynewsmagazine\/"]},{"@type":"Person","@id":"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/1bfc3f9ca41c36d79d14911952e22986","name":"Sarah John","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/diversitynewsmagazine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/fd91685c57f3a87a779fd9a04d1c917065268fbc260d20f51f19e9c8a6e37153?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd91685c57f3a87a779fd9a04d1c917065268fbc260d20f51f19e9c8a6e37153?s=96&r=g","caption":"Sarah John"},"description":"Sarah John is a writer at Diversity News Magazine, covering a wide range of topics including lifestyle, entertainment, health, and current events. Passionate about sharing informative and engaging content, Sarah aims to inspire readers through stories that celebrate diversity and positivity.","url":"https:\/\/diversitynewsmagazine.com\/author\/sarah\/"}]}},"_links":{"self":[{"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/posts\/7197","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/comments?post=7197"}],"version-history":[{"count":2,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/posts\/7197\/revisions"}],"predecessor-version":[{"id":7208,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/posts\/7197\/revisions\/7208"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/media\/7207"}],"wp:attachment":[{"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/media?parent=7197"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/categories?post=7197"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/diversitynewsmagazine.com\/wp-json\/wp\/v2\/tags?post=7197"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}