{"id":4797,"date":"2024-09-17T10:57:11","date_gmt":"2024-09-17T10:57:11","guid":{"rendered":"https:\/\/www.kiwitech.com\/blog\/?p=4797"},"modified":"2024-09-16T10:59:28","modified_gmt":"2024-09-16T10:59:28","slug":"phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat","status":"publish","type":"post","link":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/","title":{"rendered":"<strong>Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat<\/strong>"},"content":{"rendered":"\n<p>Phishing has become one of the most common and deceptive forms of cyberattacks. Instead of using advanced hacking techniques, cybercriminals rely on tricking people with fake emails, messages, and login pages. No complicated hacks\u2014just a clever play.<\/p>\n\n\n\n<p>Phishing relies on trust, not technical flaws. Scammers send out convincing emails, messages, or texts, hoping someone takes the bait. And when they do, it can result in victims handing over sensitive details like passwords, financial info, and more.<\/p>\n\n\n\n<p>But by the end of this guide, you\u2019ll know exactly how to spot these traps and protect your business. Let\u2019s begin.<\/p>\n\n\n\n<h2><strong>How Many Phishing Attacks Happen Per Day?<\/strong><\/h2>\n\n\n\n<p>Before we dive into the numbers, let\u2019s quickly define <strong>phishing<\/strong>. Phishing is a type of cyberattack where criminals pose as legitimate entities\u2014like banks or well-known companies\u2014through emails, messages, or fake websites to steal sensitive information such as passwords, financial details, or personal data.<\/p>\n\n\n\n<p>Now, here\u2019s the staggering part: <em>a cyberattack happens every 39 seconds<\/em>, according to a <a href=\"https:\/\/eng.umd.edu\/news\/story\/study-hackers-attack-every-39-seconds\" target=\"_blank\" rel=\"noreferrer noopener\">report<\/a> by the University of Maryland. That adds up to <em>more than 2,200 cyberattacks a day<\/em>, and phishing is at the top of the list, making up nearly one-third of all data breaches.<\/p>\n\n\n\n<p>Cybercriminals create nearly a million phishing websites every month. That\u2019s right\u2014nearly a million fake sites designed to trick people into entering their login info or downloading malicious software. And with more than 85% of web users reusing the same password across multiple sites, one successful phishing attack could mean access to multiple accounts.<\/p>\n\n\n\n<h2><strong>The Different Types of Phishing Attacks<\/strong><\/h2>\n\n\n\n<p>Let\u2019s break down the most common types of phishing attacks you should watch out for:<\/p>\n\n\n\n<h3><strong>Bulk Phishing<\/strong><\/h3>\n\n\n\n<p>Attackers send out thousands, sometimes millions, of emails, hoping a few unsuspecting victims will take the bait. These emails often look like official correspondence from banks, popular retailers, or even government agencies. They\u2019ll ask you to click a link, log in, and boom\u2014now they have your login info. It\u2019s basic but effective.<\/p>\n\n\n\n<h3><strong>Spear Phishing<\/strong><\/h3>\n\n\n\n<p>Spear phishing isn\u2019t random. Instead of casting a wide net, these attacks target specific individuals or departments within a business. Often, attackers research their targets, making the emails seem more legitimate. Got an email that looks like it\u2019s from your company\u2019s HR department or IT admin? Double-check before you click\u2014it might be a spear-phishing attempt.<\/p>\n\n\n\n<h3><strong>Whaling<\/strong><\/h3>\n\n\n\n<p>Whaling is like spear phishing, but on a larger scale. Here, attackers target high-level executives\u2014think CEOs, CFOs, and other big fish (whales) within a company. By impersonating senior management, attackers trick employees into sharing sensitive company information. They might even authorize bogus wire transfers. Because, let\u2019s face it, when the &#8220;CEO&#8221; asks you to do something, you\u2019re probably not going to question it too much.<\/p>\n\n\n\n<h3><strong>Clone Phishing<\/strong><\/h3>\n\n\n\n<p>In a clone phishing attack, cybercriminals don\u2019t bother writing new emails from scratch. Instead, they copy legitimate emails that you\u2019ve received from a trusted source, swap out the real link for a fake one, and resend it to you. The email looks identical to the original\u2014so you\u2019re more likely to click the link without a second thought.<\/p>\n\n\n\n<h3><strong>Smishing and Vishing<\/strong><\/h3>\n\n\n\n<p>Phishing isn\u2019t just confined to email anymore. Attackers have branched out into text messages (<strong>smishing<\/strong>) and phone calls (<strong>vishing<\/strong>). Remember that scam call you got from someone claiming to be the Internal Revenue Service (IRS)? That\u2019s vishing. And yes, that text asking you to \u201cverify your account\u201d is probably smishing. In both cases, the goal is the same: trick you into handing over sensitive info.<\/p>\n\n\n\n<h2><strong>Why Phishing Works<\/strong><\/h2>\n\n\n\n<p>Phishing attacks work because they exploit something that we all have: <em>trust<\/em>. Cybercriminals know that most of us expect to receive emails from banks, government agencies, or even our own employers. And when something seems urgent\u2014like a notice saying your account has been compromised\u2014we\u2019re more likely to act quickly without second-guessing.<\/p>\n\n\n\n<p>Add to that the fact that many phishing emails look almost identical to legitimate ones, and you have a recipe for disaster. A misspelled word here, a slightly off URL there\u2014that\u2019s often all that separates a real email from a phishing attack.<\/p>\n\n\n\n<h2><strong>How to Spot a Phishing Attempt<\/strong><\/h2>\n\n\n\n<p>You don\u2019t have to be a cybersecurity expert to spot a phishing attack. Keep an eye out for these red flags:<\/p>\n\n\n\n<ul>\n<li><strong>Unexpected emails<\/strong>: If you get an email out of the blue asking for sensitive info, be suspicious. Legitimate companies will never ask for passwords, Social Security numbers, or credit card details over email.<br><\/li>\n\n\n\n<li><strong>Urgent language<\/strong>: Phishing emails often use scare tactics. \u201cYour account has been compromised! Act now!\u201d Take a deep breath and think before you click.<\/li>\n\n\n\n<li><\/li>\n\n\n\n<li><strong>Suspicious links<\/strong>: Hover over any links before clicking them. If the URL looks odd or doesn\u2019t match the supposed sender\u2019s website, don\u2019t click.<br><\/li>\n\n\n\n<li><strong>Attachments from unknown senders<\/strong>: Avoid downloading attachments unless you\u2019re 100% sure they\u2019re legitimate.<\/li>\n<\/ul>\n\n\n\n<h2><strong>How to Defend Your Business Against Phishing Attacks<\/strong><\/h2>\n\n\n\n<p>No one\u2019s immune to phishing attacks, but there are steps you can take to minimize the risk:<\/p>\n\n\n\n<ol>\n<li><strong>Train Your Team<\/strong>: Make sure your employees know how to spot phishing emails and what to do when they encounter one.<br><\/li>\n\n\n\n<li><strong>Use Multi-Factor Authentication (MFA)<\/strong>: MFA adds an extra layer of security. Even if someone gets hold of your password, they\u2019ll need a second form of verification\u2014like a code sent to your phone\u2014to access your account.<br><\/li>\n\n\n\n<li><strong>Keep Software Updated<\/strong>: Make sure your business\u2019s systems, browsers, and security software are up to date.<br><\/li>\n\n\n\n<li><strong>Enable Email Filtering<\/strong>: Many email providers offer phishing protection. Turn it on to filter out suspicious emails before they even reach your inbox.<br><\/li>\n\n\n\n<li><strong>Test Your Defenses<\/strong>: Conduct regular phishing simulations to test how well your team can detect and respond to phishing attempts.<\/li>\n<\/ol>\n\n\n\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.kiwitech.com\/blog\/how-to-build-a-robust-cybersecurity-strategy-for-your-business\/\" target=\"_blank\" rel=\"noreferrer noopener\"><strong>How to Build a Robust Cybersecurity Strategy for Your Business<\/strong><\/a><\/p>\n\n\n\n<h2><strong>Key Takeaways<\/strong><\/h2>\n\n\n\n<p>Phishing attacks are an everyday threat, but with the right awareness and defences, you can protect your business. Here\u2019s what you need to remember: <em>trust your instincts, scrutinize any suspicious emails, and ensure your team is well-trained to spot potential risks<\/em>. When it comes to phishing, it&#8217;s always safer to question than to click.<\/p>\n\n\n\n<p><em>Protect your business from phishing attacks with KiwiTech\u2019s <\/em><a href=\"https:\/\/www.kiwitech.com\/services\/cybersecurity\" target=\"_blank\" rel=\"noreferrer noopener\"><em>cutting-edge cybersecurity solutions<\/em><\/a><em>. Contact us today to safeguard your data and empower your team with the right tools.<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Phishing has become one of the most common and deceptive forms of cyberattacks. Instead of using advanced hacking techniques, cybercriminals rely on tricking people with fake emails, messages, and login pages. No complicated hacks\u2014just a clever play. Phishing relies on trust, not technical flaws. Scammers send out convincing emails, messages, or texts, hoping someone takes [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":4798,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[596],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech\" \/>\n<meta property=\"og:description\" content=\"Phishing has become one of the most common and deceptive forms of cyberattacks. Instead of using advanced hacking techniques, cybercriminals rely on tricking people with fake emails, messages, and login pages. No complicated hacks\u2014just a clever play. Phishing relies on trust, not technical flaws. Scammers send out convincing emails, messages, or texts, hoping someone takes [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\" \/>\n<meta property=\"og:site_name\" content=\"KiwiTech\" \/>\n<meta property=\"article:published_time\" content=\"2024-09-17T10:57:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-16T10:59:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2024\/09\/Phishing-Attacks-How-to-Identify-and-Protect-Your-Business-From-This-Cyber-Threat.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1900\" \/>\n\t<meta property=\"og:image:height\" content=\"600\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#\/schema\/person\/cc67f5b25de974850fec8d97fcdb1ac5\"},\"headline\":\"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat\",\"datePublished\":\"2024-09-17T10:57:11+00:00\",\"dateModified\":\"2024-09-16T10:59:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\"},\"wordCount\":1074,\"publisher\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#organization\"},\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\",\"url\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\",\"name\":\"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech\",\"isPartOf\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#website\"},\"datePublished\":\"2024-09-17T10:57:11+00:00\",\"dateModified\":\"2024-09-16T10:59:28+00:00\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kiwitech.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#website\",\"url\":\"https:\/\/www.kiwitech.com\/blog\/\",\"name\":\"KiwiTech\",\"description\":\"Innovation Partner of Choice - KiwiTech\",\"publisher\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kiwitech.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#organization\",\"name\":\"KiwiTech\",\"url\":\"https:\/\/www.kiwitech.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2022\/01\/KT_Logo_white.png\",\"contentUrl\":\"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2022\/01\/KT_Logo_white.png\",\"width\":1831,\"height\":401,\"caption\":\"KiwiTech\"},\"image\":{\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kiwitech.com\/blog\/#\/schema\/person\/cc67f5b25de974850fec8d97fcdb1ac5\",\"name\":\"Admin\",\"url\":\"https:\/\/www.kiwitech.com\/blog\/author\/kiwiadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/","og_locale":"en_US","og_type":"article","og_title":"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech","og_description":"Phishing has become one of the most common and deceptive forms of cyberattacks. Instead of using advanced hacking techniques, cybercriminals rely on tricking people with fake emails, messages, and login pages. No complicated hacks\u2014just a clever play. Phishing relies on trust, not technical flaws. Scammers send out convincing emails, messages, or texts, hoping someone takes [&hellip;]","og_url":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/","og_site_name":"KiwiTech","article_published_time":"2024-09-17T10:57:11+00:00","article_modified_time":"2024-09-16T10:59:28+00:00","og_image":[{"width":1900,"height":600,"url":"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2024\/09\/Phishing-Attacks-How-to-Identify-and-Protect-Your-Business-From-This-Cyber-Threat.jpg","type":"image\/jpeg"}],"author":"Admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#article","isPartOf":{"@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/"},"author":{"name":"Admin","@id":"https:\/\/www.kiwitech.com\/blog\/#\/schema\/person\/cc67f5b25de974850fec8d97fcdb1ac5"},"headline":"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat","datePublished":"2024-09-17T10:57:11+00:00","dateModified":"2024-09-16T10:59:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/"},"wordCount":1074,"publisher":{"@id":"https:\/\/www.kiwitech.com\/blog\/#organization"},"articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/","url":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/","name":"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat - KiwiTech","isPartOf":{"@id":"https:\/\/www.kiwitech.com\/blog\/#website"},"datePublished":"2024-09-17T10:57:11+00:00","dateModified":"2024-09-16T10:59:28+00:00","breadcrumb":{"@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.kiwitech.com\/blog\/phishing-attacks-how-to-identify-and-protect-your-business-from-this-cyber-threat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kiwitech.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Phishing Attacks: How to Identify and Protect Your Business From This Cyber Threat"}]},{"@type":"WebSite","@id":"https:\/\/www.kiwitech.com\/blog\/#website","url":"https:\/\/www.kiwitech.com\/blog\/","name":"KiwiTech","description":"Innovation Partner of Choice - KiwiTech","publisher":{"@id":"https:\/\/www.kiwitech.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kiwitech.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.kiwitech.com\/blog\/#organization","name":"KiwiTech","url":"https:\/\/www.kiwitech.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kiwitech.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2022\/01\/KT_Logo_white.png","contentUrl":"https:\/\/www.kiwitech.com\/blog\/wp-content\/uploads\/2022\/01\/KT_Logo_white.png","width":1831,"height":401,"caption":"KiwiTech"},"image":{"@id":"https:\/\/www.kiwitech.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.kiwitech.com\/blog\/#\/schema\/person\/cc67f5b25de974850fec8d97fcdb1ac5","name":"Admin","url":"https:\/\/www.kiwitech.com\/blog\/author\/kiwiadmin\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/posts\/4797"}],"collection":[{"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/comments?post=4797"}],"version-history":[{"count":1,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/posts\/4797\/revisions"}],"predecessor-version":[{"id":4799,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/posts\/4797\/revisions\/4799"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/media\/4798"}],"wp:attachment":[{"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/media?parent=4797"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/categories?post=4797"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kiwitech.com\/blog\/wp-json\/wp\/v2\/tags?post=4797"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}