{"id":2749,"date":"2021-04-12T09:30:23","date_gmt":"2021-04-12T13:30:23","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=2749"},"modified":"2021-05-03T11:37:27","modified_gmt":"2021-05-03T15:37:27","slug":"how-do-it-security-compliance-services-work","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/","title":{"rendered":"How Do IT Security Compliance Services Work?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-2751 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/IT-company-implemented-security-compliance-after-it-cloud-storage-was-breached-300x200.jpg\" alt=\"IT company implemented security compliance after it cloud storage was breached\" width=\"300\" height=\"200\" \/>Businesses have a legal and ethical responsibility to protect confidential employee and customer information and safeguard their technical, physical and administrative processes. IT security compliance is used to demonstrate that an organization\u2019s cybersecurity program meets important security standards, frameworks and regulations, such as GDPR, HIPAA and PCI DSS.<\/p>\n<p>IT security compliance should not be confused with cybersecurity. While cybersecurity is practiced by businesses to protect their assets, security compliance is put in place to satisfy external requirements. <a href=\"\/it-security-compliance\/\" target=\"_blank\" rel=\"noopener\">IT security compliance services<\/a> work by developing a solid cybersecurity strategy that is based on an organization\u2019s unique needs and the results of a gap and risk assessment. Taking these essential steps helps identify vulnerable areas, enhance IT infrastructure and allow businesses to meet compliance.<\/p>\n<h2>A Closer Look At IT Compliance<\/h2>\n<p>IT compliance is a critical component of any business that uses technology in its processes. When looking at IT compliance, there are two main types to consider.<\/p>\n<p>Internal IT compliance refers to internal security policies that a business has to keep sensitive information safe and prevent cyber attacks and data breaches. This may include avoiding restricted websites or limiting the information that can be shared over email.<\/p>\n<p>External IT compliance refers to how well a business adheres to outside regulations, such as government or other regulatory bodies\u2019 standards. Not only can external compliance violations lead to cyber-attacks, they can also produce hefty fines and penalties for an organization.<\/p>\n<h2>Areas Of IT Security Compliance<\/h2>\n<p>Every organization has an obligation to assess which rules and regulations apply to their business. Most organizations must meet multiple regulations and frameworks, many of which have qualities that overlap. These regulations are put in place to <a href=\"\/why-is-it-security-compliance-important\/\" target=\"_blank\" rel=\"noopener\">encourage companies to improve their information security strategies<\/a> by providing best practices and guidelines based on the organization\u2019s industry and the type of data they store. Some of the most common areas of IT security compliance include:<\/p>\n<h3>GDPR<\/h3>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2753 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/colleagues-discuss-on-how-the-company-can-achieve-IT-security-compliance-300x200.jpg\" alt=\"colleagues discuss on how the company can achieve IT security compliance\" width=\"300\" height=\"200\" \/>The General Data Protection Regulation (GDPR) is a standard for consumer rights regarding their data. Adopted in April 2016, the GDPR contains provisions that require organizations to safeguard the confidential data and privacy of citizens who reside in the European Union. Under this standard, businesses are only allowed to collect data from users who opt into the data collection process. Companies that violate this regulation may face large fines.<\/p>\n<h3>HIPAA<\/h3>\n<p>The Health Insurance Portability and Accountability Act (HIPAA) of 1996 requires organizations to protect the security and privacy of certain health information. The U.S. Department of Health and Human Services (HHS) released the HIPAA Security Rule and the HIPAA Privacy Rule to fulfill this requirement. Both rules feature protections of personal health information, including electronically protected health information. Any company that deals with protected health information (PHI) must have the necessary network, physical and process security measures in place to meet HIPAA compliance.<\/p>\n<h3>PCI DSS<\/h3>\n<p><a href=\"https:\/\/www.fisglobal.com\/en\/insights\/merchant-solutions-worldpay\/article\/pci-dss-history-everything-you-need-to-know\" target=\"_blank\" rel=\"noopener\">The Payment Card Industry Data Security Standard (PCI DSS) was formed in 2004<\/a> by MasterCard, Visa, JCB International, Discover Financial Services and American Express. The set of security standards is governed by the Payment Card Industry Security Standards Council (PCI SSC) and aims to secure debit and credit card transactions against fraud and theft. Any organization that processes debit or credit card transactions is required to comply with these standards to safeguard sensitive data from cybercriminals.<\/p>\n<h2>IT Security Compliance Services<\/h2>\n<p>IT security compliance firms offer a range of services that enable businesses to reach and maintain compliance. Every business is different and requires a tailored approach to IT security. When businesses team up with experienced IT security compliance experts, they can receive extensive insight and get the help they need to develop data security policies that identify possible vulnerabilities and block harmful cyber-attacks.<\/p>\n<p>An IT security compliance firm will work directly with a business\u2019s internal teams to design solutions that align with current security processes and ensure that the organization has an effective risk management system. The firm works closely with businesses to meet industry regulatory requirements for compliance and to navigate complex and rapidly-changing regulations. Customized solutions give businesses peace of mind that their IT security compliance strategy will fit seamlessly with their existing business processes.<\/p>\n<h2>Reach Out To An IT Security Compliance Firm<\/h2>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2752 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/IT-auditor-inspects-the-server-to-verify-if-it-meeting-IT-security-compliance-300x200.jpg\" alt=\"IT auditor inspects the server to verify if it meeting IT security compliance\" width=\"300\" height=\"200\" \/>Most businesses understand the importance of meeting IT security compliance, but many find it challenging to deploy, protect and maintain their technology. Organizations that need assistance maintaining adherence to applicable codes, standards, laws and regulations can turn to a knowledgeable IT security compliance firm for help. The team of IT security compliance experts at SeaGlass Technology can provide businesses with a range of IT security compliance services to minimize risks that could threaten the organization\u2019s reputation and finances. For more information on how IT security compliance services work or to schedule a consultation, <a href=\"\/contact\/\">contact SeaGlass Technology<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Businesses have a legal and ethical responsibility to protect confidential employee and customer information and safeguard their technical, physical and administrative processes. IT security compliance is used to demonstrate that an organization\u2019s cybersecurity program meets important security standards, frameworks and regulations, such as GDPR, HIPAA and PCI DSS. IT security compliance should not be confused [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2750,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[57],"tags":[],"content_types":[],"class_list":{"0":"post-2749","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-it-security-compliance","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Do IT Security Compliance Services Work? - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Do IT Security Compliance Services Work? - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-12T13:30:23+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T15:37:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"How Do IT Security Compliance Services Work?\",\"datePublished\":\"2021-04-12T13:30:23+00:00\",\"dateModified\":\"2021-05-03T15:37:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/\"},\"wordCount\":803,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg\",\"articleSection\":[\"IT Security Compliance\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/\",\"name\":\"How Do IT Security Compliance Services Work? - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg\",\"datePublished\":\"2021-04-12T13:30:23+00:00\",\"dateModified\":\"2021-05-03T15:37:27+00:00\",\"description\":\"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg\",\"width\":1600,\"height\":800,\"caption\":\"the IT professionals assess the comapnys IT security to gauge compliance\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/how-do-it-security-compliance-services-work\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How Do IT Security Compliance Services Work?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Do IT Security Compliance Services Work? - SeaGlass Technology","description":"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/","og_locale":"en_US","og_type":"article","og_title":"How Do IT Security Compliance Services Work? - SeaGlass Technology","og_description":"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.","og_url":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/","og_site_name":"SeaGlass Technology","article_published_time":"2021-04-12T13:30:23+00:00","article_modified_time":"2021-05-03T15:37:27+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"How Do IT Security Compliance Services Work?","datePublished":"2021-04-12T13:30:23+00:00","dateModified":"2021-05-03T15:37:27+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/"},"wordCount":803,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","articleSection":["IT Security Compliance"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/","url":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/","name":"How Do IT Security Compliance Services Work? - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","datePublished":"2021-04-12T13:30:23+00:00","dateModified":"2021-05-03T15:37:27+00:00","description":"Multitude reasons for why IT security compliance standards are implemented, and there are differing explanations for them.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","width":1600,"height":800,"caption":"the IT professionals assess the comapnys IT security to gauge compliance"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/how-do-it-security-compliance-services-work\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"How Do IT Security Compliance Services Work?"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/the-IT-professionals-assess-the-comapnys-IT-security-to-gauge-compliance-.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2749","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=2749"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2749\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/2750"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=2749"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=2749"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=2749"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=2749"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}