{"id":2754,"date":"2021-04-05T09:30:56","date_gmt":"2021-04-05T13:30:56","guid":{"rendered":"https:\/\/seaglasstech.wpenginepowered.com\/?p=2754"},"modified":"2021-05-03T11:30:39","modified_gmt":"2021-05-03T15:30:39","slug":"what-are-the-it-security-compliance-standards","status":"publish","type":"post","link":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/","title":{"rendered":"What Are The IT Security Compliance Standards?"},"content":{"rendered":"<p><img fetchpriority=\"high\" decoding=\"async\" class=\"size-medium wp-image-2758 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/employees-conduct-thorough-inspection-of-the-servers-to-ensure-they-meet-IT-security-compliance-standards-300x200.jpg\" alt=\"employees conduct thorough inspection of the servers to ensure they meet IT security compliance standards\" width=\"300\" height=\"200\" \/>IT security compliance standards are put in place by regulatory bodies to <a href=\"\/what-is-it-security-compliance\/\" target=\"_blank\" rel=\"noopener\">help organizations strengthen their security<\/a>, improve processes, meet privacy requirements and achieve other critical business objectives. No two businesses are the same, which means they may not be required to comply with the same rules and regulations. Companies need to understand what IT security compliance standards pertaining to their unique industry and how to effectively comply with these standards to avoid hefty fees and penalties.<\/p>\n<h2>Importance Of IT Security Compliance<\/h2>\n<p>Many organizations are mandated to create systems that protect the privacy and security of customer data. There are several key reasons that these IT security compliance standards exist and are closely monitored.<\/p>\n<p>Regulations are developed to help companies improve their information security strategies by providing best practices and guidelines based on their industry and the type of data they manage and store. Non-compliance with these standards can result in consequences like data breaches.<\/p>\n<p>Businesses can also enjoy a variety of benefits when they choose to comply with IT security compliance standards. IT security compliance helps to protect a company\u2019s reputation. According to Forbes, there have been more than 300 data breaches involving the theft of over 100,000 records. IT security compliance standards can help <a href=\"\/why-is-it-security-compliance-important\/\" target=\"_blank\" rel=\"noopener\">enhance a company\u2019s data management capabilities and dramatically reduce the risk of breaches<\/a>.<\/p>\n<p>Other key benefits of IT security compliance standards include:<\/p>\n<ul>\n<li>Increased control over business security resulting in fewer errors and a reduction in internal and external threats.<\/li>\n<li>Fewer financial losses due to data breaches and associated costs, such as repair expenses and legal fees.<\/li>\n<li>Improved security measures by following IT security compliance best practices and guidelines.<\/li>\n<li>Maintained trust with customers as consumers are more likely to trust a company if they know that their information is safe.<\/li>\n<\/ul>\n<h2>Common IT Security Compliance Regulations<\/h2>\n<p>Many U.S. information technology security compliance standards now exist. Some of the most common include:<\/p>\n<h3>GDPR<\/h3>\n<p>The General Data Protection Regulation (GDPR) is a security and privacy law created by the European Union (EU). The standard was made to protect citizens in the EU from data breaches and applies to all businesses that process personal data for people that live in the EU, including companies not physically based in the European Union.<\/p>\n<h3>HIPAA<\/h3>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2757 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/servers-are-set-up-in-a-manner-that-follows-the-IT-security-compliance-standards-300x200.jpg\" alt=\"servers are set up in a manner that follows the IT security compliance standards\" width=\"300\" height=\"200\" \/>The Health Insurance Portability and Accountability Act was passed in 1996 by Congress and is a federal law. HIPAA includes a series of standards for health care data on electronic billing. It also allows for the transfer and continuation of health insurance for American employees and their families when they lose or change jobs.<\/p>\n<h3>PCI DSS<\/h3>\n<p>The Payment Card Industry Data Security Standard (PCI DSS) is a widely-known security standard designed to help businesses proactively protect customer account data. This standard was formed in 2004 by MasterCard, Visa, American Express, JCB International and Discover Financial Services and helps secure debit and credit card transactions against fraud and theft.<\/p>\n<h3>NIST<\/h3>\n<p>The National Institute of Standards and Technology (NIST) is a critical resource for technological security and advancement at many businesses across the country. Complying with NIST standards is an important priority in nearly all industries that deal with tech. NIST standards are based on best practices from security organizations, publications and documents.<\/p>\n<h3>FISMA<\/h3>\n<p>The Federal Information Security Management Act (FISMA) was established in 2002 and enforces federal agencies to develop and implement data security and protection programs. The standard was introduced to help reduce security risks to federal data while managing federal spending on data security.<\/p>\n<h3>CIS Controls<\/h3>\n<p>The Center for Internet Security (CIS) Controls are a widely-accepted set of actions for cyber defense. These standards were put in place to help prevent <a href=\"https:\/\/www.cloudcodes.com\/blog\/internal-external-cyber-attacks.html\" target=\"_blank\" rel=\"noopener\">dangerous cyber attacks and other internal and external threats<\/a>. The main objective of the Controls is to protect vital infrastructure, assets and information.<\/p>\n<h2>Meeting IT Compliance Requirements<\/h2>\n<p>Complying with IT security standards can be a complex endeavor that can present a great deal of challenges to businesses of all sizes. Today\u2019s technology compliance rules often require businesses to continually monitor their processes and applications, which can be both costly and time-consuming. To meet IT compliance requirements, organizations must create and implement solutions that are effective, affordable and non-intrusive.<\/p>\n<p>One of the best ways to ensure that IT compliance requirements are met is to work with an experienced IT security firm. In addition to avoiding fines, businesses that use IT security services can benefit from improved customer relations, better partnerships and operational benefits.<\/p>\n<h2>Speak With An IT Security Compliance Firm<\/h2>\n<p><img decoding=\"async\" class=\"size-medium wp-image-2756 alignright\" src=\"https:\/\/seaglasstech.wpenginepowered.com\/wp-content\/uploads\/2021\/04\/colleagues-routinely-assess-the-servers-to-ensure-they-adhere-to-IT-security-compliance-standards-300x200.jpg\" alt=\"colleagues routinely assess the servers to ensure they adhere to IT security compliance standards\" width=\"300\" height=\"200\" \/>SeaGlass Technology is an experienced IT security compliance firm that offers expert IT security compliance services. Gain a deeper understanding of your business\u2019s security threats and how to protect your company from these risks best. For more information about IT security compliance standards or to speak with a knowledgeable IT security compliance professional, <a href=\"\/contact\/\">reach out to SeaGlass Technology<\/a> today.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>IT security compliance standards are put in place by regulatory bodies to help organizations strengthen their security, improve processes, meet privacy requirements and achieve other critical business objectives. No two businesses are the same, which means they may not be required to comply with the same rules and regulations. Companies need to understand what IT [&hellip;]<\/p>\n","protected":false},"author":13,"featured_media":2755,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":"","_links_to":"","_links_to_target":""},"categories":[3],"tags":[],"content_types":[],"class_list":{"0":"post-2754","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-it-security","8":"entry"},"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Are The IT Security Compliance Standards? - SeaGlass Technology<\/title>\n<meta name=\"description\" content=\"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Are The IT Security Compliance Standards? - SeaGlass Technology\" \/>\n<meta property=\"og:description\" content=\"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/\" \/>\n<meta property=\"og:site_name\" content=\"SeaGlass Technology\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-05T13:30:56+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-05-03T15:30:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"800\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"SeaGlass Technology\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"SeaGlass Technology\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/\"},\"author\":{\"name\":\"SeaGlass Technology\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\"},\"headline\":\"What Are The IT Security Compliance Standards?\",\"datePublished\":\"2021-04-05T13:30:56+00:00\",\"dateModified\":\"2021-05-03T15:30:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/\"},\"wordCount\":810,\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg\",\"articleSection\":[\"IT Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/\",\"name\":\"What Are The IT Security Compliance Standards? - SeaGlass Technology\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg\",\"datePublished\":\"2021-04-05T13:30:56+00:00\",\"dateModified\":\"2021-05-03T15:30:39+00:00\",\"description\":\"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#primaryimage\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2021\\\/04\\\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg\",\"width\":1600,\"height\":800,\"caption\":\"IT professional uses tablet to know the best practice of the IT security compliance standards\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/what-are-the-it-security-compliance-standards\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/seaglasstechnology.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Are The IT Security Compliance Standards?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#website\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"name\":\"SeaGlass Technology\",\"description\":\"Expert NYC IT Services You Can Trust\",\"publisher\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/seaglasstechnology.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#organization\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"contentUrl\":\"https:\\\/\\\/seaglasstechnology.com\\\/wp-content\\\/uploads\\\/2022\\\/05\\\/sgt-new-seaglass-logo.png\",\"width\":1000,\"height\":309,\"caption\":\"SeaGlass Technology\"},\"image\":{\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/seaglasstechnology.com\\\/#\\\/schema\\\/person\\\/6d3610e31fbcd9f6efb25669aee1d585\",\"name\":\"SeaGlass Technology\",\"url\":\"https:\\\/\\\/seaglasstechnology.com\\\/author\\\/seaglass-technology\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Are The IT Security Compliance Standards? - SeaGlass Technology","description":"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/","og_locale":"en_US","og_type":"article","og_title":"What Are The IT Security Compliance Standards? - SeaGlass Technology","og_description":"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.","og_url":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/","og_site_name":"SeaGlass Technology","article_published_time":"2021-04-05T13:30:56+00:00","article_modified_time":"2021-05-03T15:30:39+00:00","og_image":[{"width":1600,"height":800,"url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","type":"image\/jpeg"}],"author":"SeaGlass Technology","twitter_card":"summary_large_image","twitter_misc":{"Written by":"SeaGlass Technology","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#article","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/"},"author":{"name":"SeaGlass Technology","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585"},"headline":"What Are The IT Security Compliance Standards?","datePublished":"2021-04-05T13:30:56+00:00","dateModified":"2021-05-03T15:30:39+00:00","mainEntityOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/"},"wordCount":810,"publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","articleSection":["IT Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/","url":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/","name":"What Are The IT Security Compliance Standards? - SeaGlass Technology","isPartOf":{"@id":"https:\/\/seaglasstechnology.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#primaryimage"},"image":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#primaryimage"},"thumbnailUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","datePublished":"2021-04-05T13:30:56+00:00","dateModified":"2021-05-03T15:30:39+00:00","description":"Organizations must ensure they adhere to the IT security compliance standards within their industries. Learn what these standards are and who they apply to.","breadcrumb":{"@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#primaryimage","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","width":1600,"height":800,"caption":"IT professional uses tablet to know the best practice of the IT security compliance standards"},{"@type":"BreadcrumbList","@id":"https:\/\/seaglasstechnology.com\/what-are-the-it-security-compliance-standards\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/seaglasstechnology.com\/"},{"@type":"ListItem","position":2,"name":"What Are The IT Security Compliance Standards?"}]},{"@type":"WebSite","@id":"https:\/\/seaglasstechnology.com\/#website","url":"https:\/\/seaglasstechnology.com\/","name":"SeaGlass Technology","description":"Expert NYC IT Services You Can Trust","publisher":{"@id":"https:\/\/seaglasstechnology.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/seaglasstechnology.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/seaglasstechnology.com\/#organization","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/","url":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","contentUrl":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2022\/05\/sgt-new-seaglass-logo.png","width":1000,"height":309,"caption":"SeaGlass Technology"},"image":{"@id":"https:\/\/seaglasstechnology.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/seaglasstechnology.com\/#\/schema\/person\/6d3610e31fbcd9f6efb25669aee1d585","name":"SeaGlass Technology","url":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"}]}},"featured_image_src":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","featured_image_src_square":"https:\/\/seaglasstechnology.com\/wp-content\/uploads\/2021\/04\/IT-professional-uses-tablet-to-know-the-best-practice-of-the-IT-security-compliance-standards.jpg","author_info":{"display_name":"SeaGlass Technology","author_link":"https:\/\/seaglasstechnology.com\/author\/seaglass-technology\/"},"_links":{"self":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2754","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/comments?post=2754"}],"version-history":[{"count":0,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/posts\/2754\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media\/2755"}],"wp:attachment":[{"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/media?parent=2754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/categories?post=2754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/tags?post=2754"},{"taxonomy":"content_types","embeddable":true,"href":"https:\/\/seaglasstechnology.com\/wp-json\/wp\/v2\/content_types?post=2754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}