{"id":1048,"date":"2024-01-18T10:00:00","date_gmt":"2024-01-18T02:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=1048"},"modified":"2023-12-06T11:07:29","modified_gmt":"2023-12-06T03:07:29","slug":"mobile-email-security-best-practices","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/","title":{"rendered":"Mobile Email Security Best Practices"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > Mobile Email Security Best Practices<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-bm2th3z \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-bm2th3z button-1\" data-id=\"eb-advance-heading-bm2th3z\"><h1 class=\"eb-ah-title\">Mobile Email Security Best Practices<\/h1><p class=\"eb-ah-subtitle\">January 18, 2023<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-1024x538.jpg\" alt=\"\" class=\"wp-image-1049\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Mobile email security is crucial in today&#8217;s interconnected world, as smartphones have become a primary communication and productivity tool for many individuals and businesses. Extending best practices to your smartphone is essential to protect sensitive information and prevent data breaches.<\/p>\n\n\n\n<p>Here are some best practices to enhance mobile email security on your smartphone:<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">1. Use Strong Authentication<\/h4>\n\n\n\n<p>Enable biometric authentication (such as fingerprint or facial recognition) or a strong PIN\/password to unlock your smartphone. This provides an additional layer of security in case your device is lost or stolen.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">2. Secure Your Device<\/h4>\n\n\n\n<p>Keep your smartphone&#8217;s operating system and apps up to date with the latest security patches and updates. Regularly check for and apply software updates.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">3. Use Secure Email App<\/h4>\n\n\n\n<p>Choose a reputable and secure email app for your smartphone. Popular email apps often have robust security features and regular updates. Ensure that the app you use supports encryption (SSL\/TLS\/STARTTLS) for both incoming and outgoing emails.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">4. Beware of Phishing Emails<\/h4>\n\n\n\n<p>Be cautious of suspicious emails and phishing attempts. Never click on links or download attachments from unknown or untrusted sources. Verify the sender&#8217;s authenticity before taking any action.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">5. Regularly Back Up Your Data<\/h4>\n\n\n\n<p>Ensure your smartphone is set to automatically back up your data. This way, you can recover your email and other important information if your device is compromised.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">6. Avoid Public Wi-Fi for Sensitive Activities<\/h4>\n\n\n\n<p>Public Wi-Fi networks can be insecure, making it easier for attackers to intercept data. Avoid using public Wi-Fi for sensitive email communications, and consider using a VPN (Virtual Private Network) for added security when accessing email on the go.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">7. Enable App Permissions Carefully<\/h4>\n\n\n\n<p>Review and restrict app permissions to ensure that apps have access only to the information they need. Be cautious about granting apps access to your email accounts unless it&#8217;s necessary.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">8. Educate Yourself and Your Team<\/h4>\n\n\n\n<p>If you&#8217;re part of an organization, ensure that both you and your colleagues are educated on mobile email security best practices. Regular training and awareness programs can help prevent security breaches.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>By following these best practices, you can significantly enhance the security of your mobile email communications and reduce the risk of unauthourized access or data breaches on your smartphone. Remember that mobile security is an ongoing effort, and staying vigilant is key to maintaining the integrity of your email and personal data.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.<\/p>\n","protected":false},"author":1,"featured_media":1049,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16,17],"class_list":["post-1048","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Mobile Email Security Best Practices<\/title>\n<meta name=\"description\" content=\"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Mobile Email Security Best Practices\" \/>\n<meta property=\"og:description\" content=\"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2024-01-18T02:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/person\\\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Mobile Email Security Best Practices\",\"datePublished\":\"2024-01-18T02:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/\"},\"wordCount\":413,\"publisher\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/54.jpg\",\"keywords\":[\"Email\",\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/\",\"name\":\"Mobile Email Security Best Practices\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/54.jpg\",\"datePublished\":\"2024-01-18T02:00:00+00:00\",\"description\":\"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#primaryimage\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/54.jpg\",\"contentUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/54.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Mobile Email Security Best Practices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/mobile-email-security-best-practices\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Mobile Email Security Best Practices\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/wp-content\\\/uploads\\\/2023\\\/02\\\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/#\\\/schema\\\/person\\\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\\\/\\\/lookafter.com\\\/blog\"],\"url\":\"https:\\\/\\\/lookafter.com\\\/blog\\\/author\\\/webmaster\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Mobile Email Security Best Practices","description":"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/","og_locale":"en_US","og_type":"article","og_title":"Mobile Email Security Best Practices","og_description":"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.","og_url":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2024-01-18T02:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Mobile Email Security Best Practices","datePublished":"2024-01-18T02:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/"},"wordCount":413,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg","keywords":["Email","Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/","url":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/","name":"Mobile Email Security Best Practices","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg","datePublished":"2024-01-18T02:00:00+00:00","description":"With smartphones becoming a primary communication tool today, adopting mobile best practices is key to protect important data, like email.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/12\/54.jpg","width":1200,"height":630,"caption":"Mobile Email Security Best Practices"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/mobile-email-security-best-practices\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Mobile Email Security Best Practices"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1048","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=1048"}],"version-history":[{"count":2,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1048\/revisions"}],"predecessor-version":[{"id":1051,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1048\/revisions\/1051"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/1049"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=1048"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=1048"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=1048"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}