{"id":1849,"date":"2024-12-24T09:30:00","date_gmt":"2024-12-24T01:30:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=1849"},"modified":"2024-12-02T16:23:06","modified_gmt":"2024-12-02T08:23:06","slug":"a-guide-to-online-data-protection","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/","title":{"rendered":"A Guide to Online Data Protection"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> > <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> > A Guide to Online Data Protection<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\">A Guide to Online Data Protection<\/h2><p class=\"eb-ah-subtitle\">December 24, 2024<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-1024x538.jpg\" alt=\"A Guide to Online Data Protection\" class=\"wp-image-1850\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>We love the convenience of sharing and connecting online, but what about the information we leave behind?\u00a0 This guide isn&#8217;t about shutting yourself off from the digital world, it&#8217;s about reclaiming your privacy. Keep reading to learn how to navigate the online landscape with confidence and keep your valuable data safe.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">1. Fortress Passwords<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Build Strong Passwords:<\/strong> Imagine a password as a lock on your data vault. The stronger the lock, the harder it is to crack. Use a mix of uppercase and lowercase letters, numbers, and symbols. No birthdays, pet names, or dictionary words \u2013 those are easy to guess!<\/li>\n\n\n\n<li><strong>Don&#8217;t Reuse Keys:<\/strong> Think of each password as a unique key. Don&#8217;t use the same key for different accounts. If one gets stolen, all your accounts are at risk!<\/li>\n\n\n\n<li><strong>Password Managers:<\/strong> Remembering unique passwords can be a pain. A password manager app securely stores them all for you, so you only need to remember one strong master password.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">2. Shields Up for Browsing<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Beware of Shady Sites:<\/strong> Not all websites are created equal. Look for the padlock symbol in the address bar before entering personal information. This means the site encrypts your data, making it scrambled and unreadable to eavesdroppers.<\/li>\n\n\n\n<li><strong>Public Wi-Fi with Caution:<\/strong> Public Wi-Fi at coffee shops or airports is convenient, but not always secure. Avoid online banking or entering sensitive information on these networks.<\/li>\n\n\n\n<li><strong>Virtual Private Network (VPN):<\/strong> Consider a VPN for an extra layer of protection on public Wi-Fi. It acts like a tunnel, encrypting your internet traffic and making it harder for snoopers to see your online activity.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">3. Data Defence<\/h4>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Think Before You Share:<\/strong> Social media is fun, but be mindful of what you post. Oversharing personal details like your address or birthdate can make you vulnerable to identity theft.<\/li>\n\n\n\n<li><strong>App Alert:<\/strong> Not all apps are equal in terms of security and trustworthiness. Before downloading an app, read reviews and check what data it collects. Only install apps from trusted sources.<\/li>\n\n\n\n<li><strong>Regular Backups:<\/strong> Even the best defences can sometimes falter. Regularly back up your important data on an external hard drive or cloud storage. This way, if something goes wrong, you won&#8217;t lose your precious files.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\">Bonus Tip<\/h4>\n\n\n\n<p>Be cautious about emails and messages asking for your personal information. Legitimate businesses won&#8217;t pressure you into sharing passwords or account details. If something seems suspicious, don&#8217;t click on any links or attachments, and report it as spam.<\/p>\n\n\n\n<p>By following these simple steps, you can create a stronger defence for your sensitive data online. Remember, protecting your information is an ongoing process, but with a little vigilance, you can keep your online world safe and secure.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!<\/p>\n","protected":false},"author":1,"featured_media":1850,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"content\",\"tags\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[17],"class_list":["post-1849","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-security-privacy"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>A Guide to Online Data Protection<\/title>\n<meta name=\"description\" content=\"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Guide to Online Data Protection\" \/>\n<meta property=\"og:description\" content=\"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2024-12-24T01:30:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"A Guide to Online Data Protection\",\"datePublished\":\"2024-12-24T01:30:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\"},\"wordCount\":466,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg\",\"keywords\":[\"Security &amp; Privacy\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\",\"url\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\",\"name\":\"A Guide to Online Data Protection\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg\",\"datePublished\":\"2024-12-24T01:30:00+00:00\",\"description\":\"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg\",\"width\":1200,\"height\":630,\"caption\":\"A Guide to Online Data Protection\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Guide to Online Data Protection\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Guide to Online Data Protection","description":"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/","og_locale":"en_US","og_type":"article","og_title":"A Guide to Online Data Protection","og_description":"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!","og_url":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2024-12-24T01:30:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"A Guide to Online Data Protection","datePublished":"2024-12-24T01:30:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/"},"wordCount":466,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg","keywords":["Security &amp; Privacy"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/","url":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/","name":"A Guide to Online Data Protection","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg","datePublished":"2024-12-24T01:30:00+00:00","description":"Learn to fortify your digital fortress \u2013 discover essential tips to safeguard your sensitive data online. Shield Your Stuff now!","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2024\/12\/A-Guide-to-Online-Data-Protection.jpg","width":1200,"height":630,"caption":"A Guide to Online Data Protection"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/a-guide-to-online-data-protection\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Guide to Online Data Protection"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1849","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=1849"}],"version-history":[{"count":2,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions"}],"predecessor-version":[{"id":1853,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/1849\/revisions\/1853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/1850"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=1849"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=1849"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=1849"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}