{"id":10058,"date":"2023-05-17T08:54:59","date_gmt":"2023-05-17T14:54:59","guid":{"rendered":"https:\/\/limblecmms.com\/?p=10058"},"modified":"2025-05-30T13:03:58","modified_gmt":"2025-05-30T19:03:58","slug":"brightly-hack","status":"publish","type":"post","link":"https:\/\/limblecmms.com\/blog\/brightly-hack\/","title":{"rendered":"What the Brightly hack teaches us about CMMS data security"},"content":{"rendered":"<div class=\"wpb-content-wrapper\"><p>[vc_row kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column][vc_column_text]<span style=\"font-weight: 400;\">With the recent <a href=\"https:\/\/www.techtimes.com\/articles\/291464\/20230512\/schooldude-data-breach-hackers-stole-3-million-user-accounts-april.htm\">Brightly hack<\/a> of millions of user accounts, you aren\u2019t alone if you are wondering how CMMS or other SaaS software systems secure your <span id=\"brightly-hack-means\">data.\u00a0\u00a0<\/span><\/span><\/p>\n<p><span style=\"font-weight: 400;\">We will share what there is to learn from this event about selecting a CMMS.\u00a0 We will also list what you and your team can do to keep your data safe, and your systems able to run maintenance without interruption.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What the Brightly hack means for its customers<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">At this point, most of us have experienced or been notified that our data has been breached in some way or another.\u00a0 But what does it mean specifically when a CMMS\u2019s data is compromised?\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Inconvenience for the maintenance workers using the system<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">At a minimum, hacks and data breaches present a major inconvenience for the victims of the attack. Going through the process of resetting passwords, informing impacted stakeholders, and performing incident response is a preventable drain on resources.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Breach of trust with the maintenance team\u2019s internal customers<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Speaking of informing impacted stakeholders, data breaches can have a big reputational impact.\u00a0 Maintenance teams rely on a lot of user and company data to get their jobs done. And their organizations place a lot of trust in them to manage it well.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the case of a breach of <\/span><a href=\"https:\/\/limblecmms.com\/blog\/maintenance-data\/\"><span style=\"font-weight: 400;\">maintenance data<\/span><\/a><span style=\"font-weight: 400;\">, internal data on operations, productivity, and budgeting is at risk. Organizations trust their maintenance managers and staff to choose their vendors wisely and take steps to protect this <span id=\"what-your-vendor-should-be-doing\"><\/span>data.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Long-term financial and personal consequences<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Any data breach can run the risk of long-term financial and personal costs for the users and companies involved.\u00a0 Identity theft and fraud carry real risks to individuals, and the cost of mitigating or compensating for those risks can be costly for companies.<\/span>[\/vc_column_text][\/vc_column][\/vc_row][vc_row content_placement=&#8221;middle&#8221; kd_background_image_position=&#8221;vc_row-bg-position-bottom&#8221; kd_top_separator_style=&#8221;skew-left&#8221; kd_top_separator_height=&#8221;separator-height-small&#8221; kd_bottom_separator_style=&#8221;skew-left&#8221; kd_bottom_separator_height=&#8221;separator-height-small&#8221; kd_top_separator=&#8221;true&#8221; kd_bottom_separator=&#8221;true&#8221; css=&#8221;.vc_custom_1682969636891{margin-bottom: 40px !important;padding-top: 120px !important;padding-right: 40px !important;padding-bottom: 50px !important;padding-left: 40px !important;background: #dde4e8 url(https:\/\/limblecmms.com\/wp-content\/uploads\/cta-laired-hex-4.webp?id=9077) !important;background-position: center !important;background-repeat: no-repeat !important;background-size: cover !important;border-radius: 0px !important;}&#8221; css_tablet_landscape=&#8221;.vc_custom_1682969636891{padding-bottom: 80px !important;}&#8221; css_tablet_portrait=&#8221;.vc_custom_1682969636891{padding-bottom: 80px !important;}&#8221; css_mobile=&#8221;.vc_custom_1682969636892{padding-bottom: 80px !important;}&#8221;][vc_column][vc_row_inner kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner]<header class=\"kd-section-title col-lg-12 text-center  subtitle-below-title kd-animated fadeIn   vc_custom_1686766377794\" data-animation-delay=200><h2 class=\"separator_off\" style=\"font-size: 42px;font-weight: 500;margin-bottom:30px;\">CMMS Buyer's Guide<\/h2><h6 class=\"subtitle\" style=\"color: #152232;\">Learn the questions to ask and the features to look for during the CMMS selection process - and find the right CMMS for you.<\/h6><\/header>[\/vc_column_inner][\/vc_row_inner][vc_row_inner content_placement=&#8221;top&#8221; kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column_inner width=&#8221;1\/2&#8243; css=&#8221;.vc_custom_1631866454223{padding-right: 50px !important;padding-left: 0px !important;}&#8221; offset=&#8221;vc_col-lg-6 vc_col-md-12 vc_col-xs-12&#8243; css_tablet_landscape=&#8221;.vc_custom_1631866454223{padding-right: 0px !important;}&#8221; css_tablet_portrait=&#8221;.vc_custom_1631866454223{padding-right: 0px !important;}&#8221; css_mobile=&#8221;.vc_custom_1631866454224{padding-right: 15px !important;}&#8221;][vc_single_image source=&#8221;external_link&#8221; custom_src=&#8221;https:\/\/3975608.fs1.hubspotusercontent-na1.net\/hubfs\/3975608\/Content%20Downloads\/CMMS%20Buyers%20Guide%20Image.png&#8221;][\/vc_column_inner][vc_column_inner width=&#8221;1\/2&#8243;][vc_raw_html]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[\/vc_raw_html][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row][vc_row kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column][vc_column_text]<\/p>\n<h2><span style=\"font-weight: 400;\">What your software vendor should be doing to protect your data<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Any cloud-based software you are using should be forthcoming about their data security practices during the sales or customer support process.\u00a0 Some industries like healthcare and finance have regulations they are required to follow for the sensitive data they store. Aside from those regulations, there are 7 pillars of security that any SaaS company should follow.\u00a0<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Strong authentication <span id=\"how-to-vet-when-not-a-security-expert\"><\/span>and access management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Network control<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Perimeter network control<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Vendor management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Data protection<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Governance and incident management<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Scalability and reliability<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">How to vet a vendor&#8217;s security practices when you aren\u2019t a data security expert<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">If you are a maintenance manager responsible for finding a CMMS solution at your organization, how do you evaluate a software\u2019s data practices when that isn\u2019t your area of expertise? Here are two approaches:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Rely on your internal partners in IT. <\/b><span style=\"font-weight: 400;\">Your company likely has someone on staff with the right expertise to help you evaluate a software\u2019s data security. Use them as a partner in this process.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><b>Use this as an opportunity to evaluate the vendor\u2019s service. <\/b><span style=\"font-weight: 400;\">A vendor\u2019s ability to cooperatively explain this complex yet critically important information can tell you a lot about them. If they can\u2019t or aren\u2019t willing to share details, run the other way.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">At Limble, our world-class <span id=\"what-you-can-do\"><\/span>data security practices ensure that your account information is safe. We use state-of-the-art technologies and industry best practices to maintain a secure infrastructure, including SOC-II Type II certification, regular penetration testing, and continuous security training for our staff. If you would like to review our security practices, we invite you to visit the <\/span><a href=\"https:\/\/trust.limblecmms.com\/\"><span style=\"font-weight: 400;\">Limble Trust Center<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">What you can do to protect your data<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">When choosing to partner with a SAAS company, it is easy to feel like your data security depends solely on the vendor.\u00a0 But the truth is that there is a lot you, the user, can do to keep your information safe and secure.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Follow as many of these security best practices, and you will be on your way toward taking control of your data security.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Use a password vault to create and protect strong passwords<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Create passwords that are difficult for hackers to guess by using a combination of uppercase and lowercase letters, numbers, and special characters. Avoid using the same password for multiple accounts, as this increases the risk of a hacker gaining access to multiple accounts. <\/span><\/p>\n<p><span style=\"font-weight: 400;\">Store these strong passwords in your vault. Install the password vault extension to your browser to ensure you have easy access to your stored passwords.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Perform regular software updates<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Hackers often exploit vulnerabilities in outdated software to gain access to systems. While most updates occur automatically, it is best practice to periodically check your operating system for any available updates.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Be vigilant about phishing scams\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Phishing is a common tactic used by hackers to trick individuals into revealing sensitive information such as passwords, credit card numbers, or proprietary company information. This is why it\u2019s important to be cautious of emails or messages from unverified senders or those that ask for sensitive information.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Use antivirus software\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Antivirus software plays an important role to protect your computer from malware and other malicious software. Utilize an antivirus program to maintain a layer of protection for your company-provided devices.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Limit access to sensitive information\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Only provide sensitive information (e.g. SSNs, credit card information, personal or customer data) when absolutely necessary. Avoid storing this information on your computer, and instead, save information in a cloud drive. Always verify who you are providing sensitive information to before sending it.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Be cautious when using unsecured public Wi-Fi\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Unsecured public Wi-Fi networks are unsafe, and hackers can use them to intercept data. Avoid accessing sensitive information while using public Wi-Fi. Utilizing a mobile hotspot on your own mobile device is a great alternative.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Use a VPN<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">A virtual private network (VPN) can help protect your online privacy and security by encrypting your internet connection. If you regularly access internal systems while traveling or from public Wi-Fi networks, consider using a VPN.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Travel safe\u00a0<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Keep track of your devices. Don&#8217;t leave your laptop, tablet, or smartphone unattended in a public place or vehicle. While out in a public area, be cautious of individuals trying to steal information by <span id=\"conclusion\"><\/span>spying on your device\u2019s screen while it is in use.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Report any suspicious activity and lost or stolen devices immediately<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Where there is smoke, there is usually fire. And by catching risks, vulnerabilities, and signs of an attack early, you can prevent a lot of the negative consequences.\u00a0 It is essential to train your team to be vigilant about the signs and common causes of attacks, and to report them right away.\u00a0<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Conclusion<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">In short, it is essential to not only be diligent about the software vendors you choose to work with, but also the internal practices each of your team members follow to keep data secure. Limble is a company that takes data security very seriously, and we serve as a partner for all our customers in doing the same.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you would like to learn more about our software, sign up for a <\/span><a href=\"https:\/\/limblecmms.com\/get-started\/\"><span style=\"font-weight: 400;\">free trial<\/span><\/a><span style=\"font-weight: 400;\"> or <\/span><a href=\"https:\/\/limblecmms.com\/demo-request\/\"><span style=\"font-weight: 400;\">sign up for a demo<\/span><\/a><span style=\"font-weight: 400;\"> today.<\/span>[\/vc_column_text][\/vc_column][\/vc_row]<\/p>\n<\/div>","protected":false},"excerpt":{"rendered":"<p>[vc_row kd_background_image_position=&#8221;vc_row-bg-position-top&#8221;][vc_column][vc_column_text]With the recent Brightly hack of millions of user [&hellip;]<\/p>\n","protected":false},"author":24,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[736],"tags":[],"class_list":["post-10058","post","type-post","status-publish","format-standard","hentry","category-compliance-safety"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.7.1 (Yoast SEO v25.7) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What the Brightly Hack Teaches Us about CMMS Data Security<\/title>\n<meta name=\"description\" content=\"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What the Brightly Hack Teaches Us about CMMS Data Security\" \/>\n<meta property=\"og:description\" content=\"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/\" \/>\n<meta property=\"og:site_name\" content=\"Limble CMMS\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/limblecmms\/\" \/>\n<meta property=\"article:published_time\" content=\"2023-05-17T14:54:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-30T19:03:58+00:00\" \/>\n<meta name=\"author\" content=\"Bryan Christiansen\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What the Brightly Hack Teaches Us about CMMS Data Security\" \/>\n<meta name=\"twitter:description\" content=\"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.\" \/>\n<meta name=\"twitter:creator\" content=\"@LimbleCMMS\" \/>\n<meta name=\"twitter:site\" content=\"@LimbleCMMS\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Bryan Christiansen\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/limblecmms.com\/blog\/brightly-hack\/\",\"url\":\"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/\",\"name\":\"What the Brightly Hack Teaches Us about CMMS Data Security\",\"isPartOf\":{\"@id\":\"https:\/\/limblecmms.com\/#website\"},\"datePublished\":\"2023-05-17T14:54:59+00:00\",\"dateModified\":\"2025-05-30T19:03:58+00:00\",\"author\":{\"@id\":\"https:\/\/limblecmms.com\/#\/schema\/person\/a3ef98afa60af6b427b9f68b67eaadd5\"},\"description\":\"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/\"]}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/limblecmms.com\/#website\",\"url\":\"https:\/\/limblecmms.com\/\",\"name\":\"Limble CMMS\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/limblecmms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/limblecmms.com\/#\/schema\/person\/a3ef98afa60af6b427b9f68b67eaadd5\",\"name\":\"Bryan Christiansen\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/limblecmms.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65733e37ef7bfb693a1b05b726fec39617cbbf39a78f93d60e1a651197875355?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65733e37ef7bfb693a1b05b726fec39617cbbf39a78f93d60e1a651197875355?s=96&d=mm&r=g\",\"caption\":\"Bryan Christiansen\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/bryan-christiansen-4a6a5914a\/\"],\"url\":\"https:\/\/limblecmms.com\/blog\/author\/marketinglimblecmms-com\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"What the Brightly Hack Teaches Us about CMMS Data Security","description":"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/","og_locale":"en_US","og_type":"article","og_title":"What the Brightly Hack Teaches Us about CMMS Data Security","og_description":"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.","og_url":"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/","og_site_name":"Limble CMMS","article_publisher":"https:\/\/www.facebook.com\/limblecmms\/","article_published_time":"2023-05-17T14:54:59+00:00","article_modified_time":"2025-05-30T19:03:58+00:00","author":"Bryan Christiansen","twitter_card":"summary_large_image","twitter_title":"What the Brightly Hack Teaches Us about CMMS Data Security","twitter_description":"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.","twitter_creator":"@LimbleCMMS","twitter_site":"@LimbleCMMS","twitter_misc":{"Written by":"Bryan Christiansen","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/limblecmms.com\/blog\/brightly-hack\/","url":"https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/","name":"What the Brightly Hack Teaches Us about CMMS Data Security","isPartOf":{"@id":"https:\/\/limblecmms.com\/#website"},"datePublished":"2023-05-17T14:54:59+00:00","dateModified":"2025-05-30T19:03:58+00:00","author":{"@id":"https:\/\/limblecmms.com\/#\/schema\/person\/a3ef98afa60af6b427b9f68b67eaadd5"},"description":"What to learn from the Brightly hack including how to evaluate data security of software vendors, and security best practices for your team.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/limblecmms.com\/learn\/compliance-safety\/brightly-hack\/"]}]},{"@type":"WebSite","@id":"https:\/\/limblecmms.com\/#website","url":"https:\/\/limblecmms.com\/","name":"Limble CMMS","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/limblecmms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/limblecmms.com\/#\/schema\/person\/a3ef98afa60af6b427b9f68b67eaadd5","name":"Bryan Christiansen","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/limblecmms.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65733e37ef7bfb693a1b05b726fec39617cbbf39a78f93d60e1a651197875355?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65733e37ef7bfb693a1b05b726fec39617cbbf39a78f93d60e1a651197875355?s=96&d=mm&r=g","caption":"Bryan Christiansen"},"sameAs":["https:\/\/www.linkedin.com\/in\/bryan-christiansen-4a6a5914a\/"],"url":"https:\/\/limblecmms.com\/blog\/author\/marketinglimblecmms-com\/"}]}},"_links":{"self":[{"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/posts\/10058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/users\/24"}],"replies":[{"embeddable":true,"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/comments?post=10058"}],"version-history":[{"count":0,"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/posts\/10058\/revisions"}],"wp:attachment":[{"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/media?parent=10058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/categories?post=10058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/limblecmms.com\/wp-json\/wp\/v2\/tags?post=10058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}