{"id":2699,"date":"2026-03-02T09:00:00","date_gmt":"2026-03-02T01:00:00","guid":{"rendered":"https:\/\/lookafter.com\/blog\/?p=2699"},"modified":"2026-02-12T17:26:38","modified_gmt":"2026-02-12T09:26:38","slug":"email-passwords-and-security","status":"publish","type":"post","link":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/","title":{"rendered":"Once Stolen, Always Unsafe: Email Passwords and Security"},"content":{"rendered":"\n<p><a href=\"https:\/\/lookafter.com\/blog\/\">Home<\/a> &gt; <a href=\"https:\/\/lookafter.com\/blog\/category\/empowering-tips\/\">Empowering Tips<\/a> &gt; Once Stolen, Always Unsafe: Email Passwords and Security<\/p>\n\n\n\n<div class=\"wp-block-essential-blocks-advanced-heading  root-eb-advance-heading-md80g\"><div class=\"eb-parent-wrapper eb-parent-eb-advance-heading-md80g \"><div class=\"eb-advance-heading-wrapper eb-advance-heading-md80g button-1 undefined\" data-id=\"eb-advance-heading-md80g\"><h2 class=\"eb-ah-title\"><span class=\"first-title\">Once Stolen, Always Unsafe: Email Passwords and Security<\/span><\/h2><p class=\"eb-ah-subtitle\">March 02, 2026<\/p><\/div><\/div><\/div>\n\n\n\n<figure class=\"wp-block-image size-large\"><img fetchpriority=\"high\" decoding=\"async\" width=\"1024\" height=\"538\" src=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-1024x538.jpg\" alt=\"Once Stolen, Always Unsafe: Email Passwords and Security\" class=\"wp-image-2700\" srcset=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-1024x538.jpg 1024w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-300x158.jpg 300w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-150x79.jpg 150w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-768x403.jpg 768w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security-360x189.jpg 360w, https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/figure>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<p>Every email account is a gateway to sensitive communication, business files, and personal information. When a password is stolen, it\u2019s no longer just a forgotten string of characters \u2014 it becomes a permanent security risk. Reusing a compromised password is like putting the same padlock back on the door after a thief has already copied the key.<\/p>\n\n\n\n<p>For administrators managing email user accounts, ensuring that compromised passwords are never reused is not just a best practice \u2014 it\u2019s a responsibility that protects the entire organization.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Why a Compromised Email Password Is Dangerous<\/h2>\n\n\n\n<p>When attackers gain access to an email account, they don\u2019t always act immediately. Sometimes they quietly monitor messages, download attachments, or set up hidden forwarding rules. Other times, they use the account to send spam or phishing emails, which can damage the company\u2019s reputation and lead to blacklisting of the mail server.<\/p>\n\n\n\n<p>If the user resets the account but chooses the <strong>same compromised password<\/strong>, the attacker can walk straight back in without any effort.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Scenarios That Show the Risk<\/h2>\n\n\n\n<h4 class=\"wp-block-heading\"><strong>The Silent Intruder<\/strong><\/h4>\n\n\n\n<p>An employee falls for a phishing scam, and the attacker steals the password. The administrator resets the account but assigns the same compromised password. Since the attacker already knows it, they log back in without raising alarms and quietly set up auto-forwarding to an external address, siphoning off months of confidential business emails.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong>The Spam Outbreak<\/strong><\/strong><\/h4>\n\n\n\n<p>A compromised email account is used to send thousands of spam messages. Because the password wasn\u2019t properly replaced, the attacker regains access and continues sending spam. Soon, the company\u2019s domain is blacklisted, and legitimate emails can\u2019t reach customers.<\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h4 class=\"wp-block-heading\"><strong><strong>The Chain Reaction<\/strong><\/strong><\/h4>\n\n\n\n<p>A stolen password gives attackers access to one user\u2019s mailbox. They send phishing messages to colleagues from that trusted account, causing multiple accounts to be compromised. What started with one unsafe password spreads across the organization.<\/p>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Administrator\u2019s Role in Managing User Accounts<\/h2>\n\n\n\n<p>Administrators may not control the mail server itself, but they play a vital role in protecting user accounts:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li><strong>Enforce Secure Password Changes<\/strong> \u2013 Never allow users to reuse an old password after a compromise.<\/li>\n\n\n\n<li><strong>Suspend Accounts Temporarily<\/strong> \u2013 If suspicious activity is detected, disable the account until the password is securely updated.<\/li>\n\n\n\n<li><strong>Educate Users<\/strong> \u2013 Explain why compromised passwords must never be recycled and encourage unique, strong replacements.<\/li>\n\n\n\n<li><strong>Apply Password Policies<\/strong> \u2013 Enforce password changes at least every 90 days and prevent reuse of old passwords.<\/li>\n\n\n\n<li><strong>Enable Additional Protection<\/strong> \u2013 Where available, enforce two-factor authentication (2FA) for user accounts.<\/li>\n<\/ul>\n\n\n\n<div style=\"height:50px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>A compromised email password is permanently unsafe. Once it\u2019s stolen, it should never be used again. Allowing reuse puts not only the individual user at risk but the entire organization. For administrators managing user accounts, enforcing strong, unique password practices is as important as locking the front door of the business every night.<\/p>\n\n\n\n<p>Just like no one would keep using a padlock when the thief already has the key, no administrator should ever allow a stolen password to return.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.<\/p>\n","protected":false},"author":1,"featured_media":2700,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_eb_attr":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"neve_meta_sidebar":"","neve_meta_container":"","neve_meta_enable_content_width":"","neve_meta_content_width":0,"neve_meta_title_alignment":"","neve_meta_author_avatar":"","neve_post_elements_order":"[\"content\",\"tags\"]","neve_meta_disable_header":"","neve_meta_disable_footer":"","neve_meta_disable_title":"","footnotes":""},"categories":[6],"tags":[16],"class_list":["post-2699","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-empowering-tips","tag-email"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.0 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Once Stolen, Always Unsafe: Email Passwords and Security<\/title>\n<meta name=\"description\" content=\"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Once Stolen, Always Unsafe: Email Passwords and Security\" \/>\n<meta property=\"og:description\" content=\"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\" \/>\n<meta property=\"og:site_name\" content=\"Lookafter Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/lookafterit\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-02T01:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"630\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"webmaster\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"webmaster\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\"},\"author\":{\"name\":\"webmaster\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\"},\"headline\":\"Once Stolen, Always Unsafe: Email Passwords and Security\",\"datePublished\":\"2026-03-02T01:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\"},\"wordCount\":525,\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg\",\"keywords\":[\"Email\"],\"articleSection\":[\"Empowering Tips\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\",\"url\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\",\"name\":\"Once Stolen, Always Unsafe: Email Passwords and Security\",\"isPartOf\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg\",\"datePublished\":\"2026-03-02T01:00:00+00:00\",\"description\":\"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.\",\"breadcrumb\":{\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg\",\"width\":1200,\"height\":630,\"caption\":\"Once Stolen, Always Unsafe: Email Passwords and Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/lookafter.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Once Stolen, Always Unsafe: Email Passwords and Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/lookafter.com\/blog\/#website\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"name\":\"Lookafter Blog\",\"description\":\"We look after your email &amp; web, so you can focus on your business.\",\"publisher\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/lookafter.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/lookafter.com\/blog\/#organization\",\"name\":\"Lookafter Blog\",\"url\":\"https:\/\/lookafter.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"contentUrl\":\"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png\",\"width\":1200,\"height\":400,\"caption\":\"Lookafter Blog\"},\"image\":{\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/lookafterit\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606\",\"name\":\"webmaster\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g\",\"caption\":\"webmaster\"},\"sameAs\":[\"https:\/\/lookafter.com\/blog\"],\"url\":\"https:\/\/lookafter.com\/blog\/author\/webmaster\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Once Stolen, Always Unsafe: Email Passwords and Security","description":"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/","og_locale":"en_US","og_type":"article","og_title":"Once Stolen, Always Unsafe: Email Passwords and Security","og_description":"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.","og_url":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/","og_site_name":"Lookafter Blog","article_publisher":"https:\/\/www.facebook.com\/lookafterit","article_published_time":"2026-03-02T01:00:00+00:00","og_image":[{"width":1200,"height":630,"url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg","type":"image\/jpeg"}],"author":"webmaster","twitter_card":"summary_large_image","twitter_misc":{"Written by":"webmaster","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#article","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/"},"author":{"name":"webmaster","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606"},"headline":"Once Stolen, Always Unsafe: Email Passwords and Security","datePublished":"2026-03-02T01:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/"},"wordCount":525,"publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg","keywords":["Email"],"articleSection":["Empowering Tips"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/","url":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/","name":"Once Stolen, Always Unsafe: Email Passwords and Security","isPartOf":{"@id":"https:\/\/lookafter.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage"},"image":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage"},"thumbnailUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg","datePublished":"2026-03-02T01:00:00+00:00","description":"Reusing a compromised email password is like giving thieves your key again. Learn why it\u2019s dangerous and how admins can protect accounts.","breadcrumb":{"@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/lookafter.com\/blog\/email-passwords-and-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#primaryimage","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2026\/01\/Email-Passwords-and-Security.jpg","width":1200,"height":630,"caption":"Once Stolen, Always Unsafe: Email Passwords and Security"},{"@type":"BreadcrumbList","@id":"https:\/\/lookafter.com\/blog\/email-passwords-and-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/lookafter.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Once Stolen, Always Unsafe: Email Passwords and Security"}]},{"@type":"WebSite","@id":"https:\/\/lookafter.com\/blog\/#website","url":"https:\/\/lookafter.com\/blog\/","name":"Lookafter Blog","description":"We look after your email &amp; web, so you can focus on your business.","publisher":{"@id":"https:\/\/lookafter.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/lookafter.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/lookafter.com\/blog\/#organization","name":"Lookafter Blog","url":"https:\/\/lookafter.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","contentUrl":"https:\/\/lookafter.com\/blog\/wp-content\/uploads\/2023\/02\/lookafter-text-logo-transparent.png","width":1200,"height":400,"caption":"Lookafter Blog"},"image":{"@id":"https:\/\/lookafter.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/lookafterit"]},{"@type":"Person","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/ba5057deece831dc69c628b135259606","name":"webmaster","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/lookafter.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/b9336067812df836782e0a74acd6c94e0a89b7efd2bbaeec9c4b24ec2d6afae3?s=96&d=mm&r=g","caption":"webmaster"},"sameAs":["https:\/\/lookafter.com\/blog"],"url":"https:\/\/lookafter.com\/blog\/author\/webmaster\/"}]}},"_links":{"self":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2699","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/comments?post=2699"}],"version-history":[{"count":2,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2699\/revisions"}],"predecessor-version":[{"id":2735,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/posts\/2699\/revisions\/2735"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media\/2700"}],"wp:attachment":[{"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/media?parent=2699"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/categories?post=2699"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/lookafter.com\/blog\/wp-json\/wp\/v2\/tags?post=2699"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}