{"id":60,"date":"2021-04-23T11:44:32","date_gmt":"2021-04-23T11:44:32","guid":{"rendered":"https:\/\/cybernexa.com\/blog\/?p=60"},"modified":"2024-05-27T09:51:53","modified_gmt":"2024-05-27T09:51:53","slug":"why-do-you-need-2fa-and-what-is-it-all-about","status":"publish","type":"post","link":"https:\/\/www.cybernexa.com\/blog\/why-do-you-need-2fa-and-what-is-it-all-about\/","title":{"rendered":"Why do you need 2FA and What is it all about?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"60\" class=\"elementor elementor-60\" data-elementor-settings=\"[]\">\r\n\t\t\t\t\t\t\t<div class=\"elementor-section-wrap\">\r\n\t\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-13ccbabb elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"13ccbabb\" data-element_type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-b2acae8\" data-id=\"b2acae8\" data-element_type=\"column\">\r\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-1f102304 elementor-widget elementor-widget-text-editor\" data-id=\"1f102304\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\r\n\t\t\t\t<div class=\"elementor-widget-container\">\r\n\t\t\t\t\t<div class=\"elementor-text-editor elementor-clearfix\"><!-- wp:paragraph -->\n<p>How safe my username and password is? This is the common question that runs in the minds of people all around the world. Is everyone is satisfied with their digital security? In this present scenario, the answer is a big `No\u2019. Digital intruders are high in recent years; we can glimpse the different terrific news about data breaches in several locations of the world. The problem is not only for amateurs but also for large organizations that lost their critical data and monetary elements. With the abrupt development in technology, we cannot able to completely stop social engineering attacks. However, we can stay protected from such threats by adding some <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2-factor authentication solutions<\/a><\/strong>. This article is about to explain the <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2FA solutions<\/a><\/strong> and their effective essentiality in different applications.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Simple analogy<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2FA solutions<\/a><\/strong> can be explained more specifically. Consider you are living in a house with simple protection called a house lock. A home intruder can just bypass the lock either by damaging it or through using a duplicate key. Consider your home with different layers of locks with additional settings. Each one has different keys which makes it the thieves hard to break into the home. Thus, even if an intruder breaks the first lock, he has to make additional efforts to surpass other locks. This analogy is the typical example of <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2-factor authentication solutions<\/a><\/strong> to any applications for its effective outcomes.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Need of 2FA&nbsp;<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The last decades are the best examples to see the evolution of digital technology. In addition to this, digital attacks had proved the incapability of conventional systems and security. This is a reason why system administrators and users are changed beyond traditional password security elements. The second layer of protection is essential to make it more protected that slows down or rejects intrusion in a more specific way. <strong><a href=\"https:\/\/www.cybernexa.com\/\">2FA solutions<\/a><\/strong> are mandatory in the current situation mainly to neutralize the threats regarding compromised passwords. In case, even if a system or individual\u2019s credential is hacked, guessed, or phished cannot lead to access without the admin access without the approval of the second factor. Thus, magnificent security can be achieved which is a more prominent way to handle critical data.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Thus, two-factor <strong><a href=\"https:\/\/www.cybernexa.com\/\">passwordless authentication<\/a><\/strong> is the dual-factor authentication that comes under the security system which necessitates users to offer two or more security factors for verification. This is mainly to protect the end-user data as well as service providers from critical data theft or any types of social engineering attacks. Thus, hijacking the username and password from the user alone cannot help intruders to intrude further. Due to its definite usage, many companies are started to using different <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2-factor authentication solutions<\/a><\/strong> for their organizations. With the increased demands in different sectors like financial institutions, banks, IT sectors, cloud applications, websites, etc. many companies are actively involved in offering the best <strong><a href=\"https:\/\/www.cybernexa.com\/\">2FA solutions<\/a><\/strong>.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">Authentication types<\/a><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Generally, adding a layer to a conventional system needs some constant effort and research. In common, there are some factors through which one can able to implement the <strong><a href=\"https:\/\/www.cybernexa.com\/\">best multi-factor authentication<\/a><\/strong>. It starts with the knowledge factor, where it is a piece of information regarding the user&#8217;s knowledge (something they know). This is nothing but a password, PIN (personal identification number), or some secret shared data. Next, is a possession factor where authentication is done based on the physical thing that the user uses that includes a mobile authenticator, security token, mobile device, smartphone that initiates authentication requests. The biological factor is also called as inherence factor where unique features of humans are taken that include a fingerprint scanner, retina scanner, facial or voice recognition. With the abrupt improvements, now behavioral biometrics like keystroke dynamics is also used by identifying machine learning patterns.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Usage of location as a <strong><a href=\"https:\/\/www.cybernexa.com\/\">Passwordless authentication<\/a> <\/strong>factor is preferable in recent days. Through this one can able to determine or limit the authentication to particular geographical areas. Thus, complete access can be achieved only by knowing the credentials as well as physical presence in a particular location. In addition to this, time factors are also considered where specific time can limit the authentication or access to the system.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">Common types of 2FA<\/a><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>The conventional form of <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">Passwordless authentication<\/a><\/strong> is a hardware token which is a tiny key that generates numeric code every thirty seconds. In a time of accessing a system, a user needs to enter the code generated in the hardware token. In other forms, token code is automatically transferred when the hardware is plugged into a system.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>With the increased usage of mobile phones, OTP became popular as an authenticator. When you want to access a system or application, it sends a unique one-time passcode via text message or email. This must be entered to get access to a particular application. However, there are some social engineering attacks are happening that may create inconvenience<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Fingerprint scanners, facial recognition, voice recognition are also used as the second layer of security which is commonly called biometric authenticator. In the future, some additional layers may also be added that include ambient noise, typing patterns, pulse, and vocal prints may also be taken into account.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Push notifications got their high usability and preferability in recent years. Authentication is done via possession factor where smart devices are used. Websites or applications send push notifications as an initial request where people can accept or reject through a simple tap. Universally, this is considered as a more protective way when compared to alternatives that have no passwords, special codes, or any other interactions. Through having a direct and secure connection between the service provider and end-users, can get rid of major threats, a man in the middle, or any type of unauthorized access at a high success rate. On considering its demands, <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">the best multi-factor authentication<\/a><\/strong> providers are offering a more innovative way of mobile authenticator based on the demands of a company.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong>Advantages&nbsp;<\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>There are several positive reasons to prefer modern <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">2-factor authentication solutions<\/a><\/strong> for any application. User-friendliness is the major expectation of users that should not make them tiered or boring for every login. This is a reason why a complete <a href=\"https:\/\/www.cybernexa.com\/\"><strong>passwordless authentication<\/strong> <\/a>process is used. Cylock\u2019s out-of-band authentication offers a simple type of security solutions where people can able to accept or rejects with simple clicks.&nbsp;<\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>Effectiveness is another important process that needs to be taken into considerations. Every security solution must be effective for its purposes. The main aim of any organization is to create trustworthiness among its potential audience. This is achieved through protecting every credential, critical data, finance, and other elements of a particular industry. Same way, end users must access their application simply without any risks. This can be achieved through implementing the best <a href=\"https:\/\/www.cybernexa.com\/\"><strong>2FA solutions<\/strong>.&nbsp;<\/a><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p><strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">Strongly recommended solutions from the best multi-factor authentication providers<\/a><\/strong><\/p>\n<!-- \/wp:paragraph -->\n\n<!-- wp:paragraph -->\n<p>A dynamic approach is essential to make a strong protection level. This is a reason why you need to rely on the best solution providers of recent decades. Many strong security companies are now available to offer the most effective as well as user-friendly <strong><a href=\"https:\/\/www.cybernexa.com\/pricing.html\">passwordless authentication<\/a><\/strong> solutions. Use <strong><a href=\"https:\/\/www.cybernexa.com\/\">Cylock MFA<\/a><\/strong>, a security product powered by Cybernexa, which is the leading solution provider for several organizations to cope up with their security demands. Attacks from existing solutions like OTP hardware tokens, SMS OTP, and phone OTP may not offer complete protection against several attacks. In such conditions, out-of-band authentication will be the preferable approach in many different areas.<\/p>\n<!-- \/wp:paragraph --><\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/section>\r\n\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-09a912e elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"09a912e\" data-element_type=\"section\">\r\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\r\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2d12626\" data-id=\"2d12626\" data-element_type=\"column\">\r\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\r\n\t\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-2a681a1 elementor-widget elementor-widget-html\" data-id=\"2a681a1\" data-element_type=\"widget\" data-widget_type=\"html.default\">\r\n\t\t\t\t<div class=\"elementor-widget-container\">\r\n\t\t\t<!-- JSON-LD markup generated by Google Structured Data Markup Helper. -->\r\n<script type=\"application\/ld+json\">\r\n{\r\n  \"@context\": \"http:\/\/schema.org\",\r\n  \"@type\": \"Article\",\r\n  \"name\": \"Why do you need 2FA and What is it all about?\",\r\n  \"author\": {\r\n    \"@type\": \"Person\",\r\n    \"name\": \"cybernexa-admin\"\r\n  },\r\n  \"datePublished\": \"2021-04-23\",\r\n  \"image\": \"https:\/\/www.cybernexa.com\/blog\/wp-content\/uploads\/2021\/04\/bp-6.jpg\",\r\n  \"articleSection\": \"How safe my username and password is? This is the common question that runs in the minds of people all around the world. Is everyone is satisfied with their digital security? In this present scenario, the answer is a big `No\u2019. Digital intruders are high in recent years; we can glimpse the different terrific news about data breaches in several locations of the world. The problem is not only for amateurs but also for large organizations that lost their critical data and monetary elements. With the abrupt development in technology, we cannot able to completely stop social engineering attacks. However, we can stay protected from such threats by adding some 2-factor authentication solutions. This article is about to explain the 2FA solutions and their effective essentiality in different applications.\",\r\n  \"articleBody\": \"Simple analogy<\/STRONG><\/P>\\n\\n\\n\\n<P><STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">2FA solutions<\/A><\/STRONG> can be explained more specifically. Consider you are living in a house with simple protection called a house lock. A home intruder can just bypass the lock either by damaging it or through using a duplicate key. Consider your home with different layers of locks with additional settings. Each one has different keys which makes it the thieves hard to break into the home. Thus, even if an intruder breaks the first lock, he has to make additional efforts to surpass other locks. This analogy is the typical example of <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">2-factor authentication solutions<\/A><\/STRONG> to any applications for its effective outcomes. <\/P>\\n\\n\\n\\n<P><STRONG>Need of 2FA <\/STRONG><\/P>\\n\\n\\n\\n<P>The last decades are the best examples to see the evolution of digital technology. In addition to this, digital attacks had proved the incapability of conventional systems and security. This is a reason why system administrators and users are changed beyond traditional password security elements. The second layer of protection is essential to make it more protected that slows down or rejects intrusion in a more specific way. <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">2FA solutions<\/A><\/STRONG> are mandatory in the current situation mainly to neutralize the threats regarding compromised passwords. In case, even if a system or individual\u2019s credential is hacked, guessed, or phished cannot lead to access without the admin access without the approval of the second factor. Thus, magnificent security can be achieved which is a more prominent way to handle critical data. <\/P>\\n\\n\\n\\n<P>Thus, two-factor <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">passwordless authentication<\/A><\/STRONG> is the dual-factor authentication that comes under the security system which necessitates users to offer two or more security factors for verification. This is mainly to protect the end-user data as well as service providers from critical data theft or any types of social engineering attacks. Thus, hijacking the username and password from the user alone cannot help intruders to intrude further. Due to its definite usage, many companies are started to using different <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">2-factor authentication solutions<\/A><\/STRONG> for their organizations. With the increased demands in different sectors like financial institutions, banks, IT sectors, cloud applications, websites, etc. many companies are actively involved in offering the best <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">2FA solutions<\/A><\/STRONG>. <\/P>\\n\\n\\n\\n<P><STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">Authentication types<\/A><\/STRONG><\/P>\\n\\n\\n\\n<P>Generally, adding a layer to a conventional system needs some constant effort and research. In common, there are some factors through which one can able to implement the <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">best multi-factor authentication<\/A><\/STRONG>. It starts with the knowledge factor, where it is a piece of information regarding the user\u2019s knowledge (something they know). This is nothing but a password, PIN (personal identification number), or some secret shared data. Next, is a possession factor where authentication is done based on the physical thing that the user uses that includes a mobile authenticator, security token, mobile device, smartphone that initiates authentication requests. The biological factor is also called as inherence factor where unique features of humans are taken that include a fingerprint scanner, retina scanner, facial or voice recognition. With the abrupt improvements, now behavioral biometrics like keystroke dynamics is also used by identifying machine learning patterns. <\/P>\\n\\n\\n\\n<P>Usage of location as a <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">Passwordless authentication<\/A> <\/STRONG>factor is preferable in recent days. Through this one can able to determine or limit the authentication to particular geographical areas. Thus, complete access can be achieved only by knowing the credentials as well as physical presence in a particular location. In addition to this, time factors are also considered where specific time can limit the authentication or access to the system. <\/P>\\n\\n\\n\\n<P><STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">Common types of 2FA<\/A><\/STRONG><\/P>\\n\\n\\n\\n<P>The conventional form of <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">Passwordless authentication<\/A><\/STRONG> is a hardware token which is a tiny key that generates numeric code every thirty seconds. In a time of accessing a system, a user needs to enter the code generated in the hardware token. In other forms, token code is automatically transferred when the hardware is plugged into a system. <\/P>\\n\\n\\n\\n<P>With the increased usage of mobile phones, OTP became popular as an authenticator. When you want to access a system or application, it sends a unique one-time passcode via text message or email. This must be entered to get access to a particular application. However, there are some social engineering attacks are happening that may create inconvenience<\/P>\\n\\n\\n\\n<P>Fingerprint scanners, facial recognition, voice recognition are also used as the second layer of security which is commonly called biometric authenticator. In the future, some additional layers may also be added that include ambient noise, typing patterns, pulse, and vocal prints may also be taken into account. <\/P>\\n\\n\\n\\n<P>Push notifications got their high usability and preferability in recent years. Authentication is done via possession factor where smart devices are used. Websites or applications send push notifications as an initial request where people can accept or reject through a simple tap. Universally, this is considered as a more protective way when compared to alternatives that have no passwords, special codes, or any other interactions. Through having a direct and secure connection between the service provider and end-users, can get rid of major threats, a man in the middle, or any type of unauthorized access at a high success rate. On considering its demands, <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">the best multi-factor authentication<\/A><\/STRONG> providers are offering a more innovative way of mobile authenticator based on the demands of a company. <\/P>\\n\\n\\n\\n<P><STRONG>Advantages <\/STRONG><\/P>\\n\\n\\n\\n<P>There are several positive reasons to prefer modern <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">2-factor authentication solutions<\/A><\/STRONG> for any application. User-friendliness is the major expectation of users that should not make them tiered or boring for every login. This is a reason why a complete <A href=\\\"https:\/\/www.cybernexa.com\/\\\"><STRONG>passwordless authentication<\/STRONG> <\/A>process is used. Cylock\u2019s out-of-band authentication offers a simple type of security solutions where people can able to accept or rejects with simple clicks. <\/P>\\n\\n\\n\\n<P>Effectiveness is another important process that needs to be taken into considerations. Every security solution must be effective for its purposes. The main aim of any organization is to create trustworthiness among its potential audience. This is achieved through protecting every credential, critical data, finance, and other elements of a particular industry. Same way, end users must access their application simply without any risks. This can be achieved through implementing the best <A href=\\\"https:\/\/www.cybernexa.com\/\\\"><STRONG>2FA solutions<\/STRONG>. <\/A><\/P>\\n\\n\\n\\n<P><STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">Strongly recommended solutions from the best multi-factor authentication providers<\/A><\/STRONG><\/P>\\n\\n\\n\\n<P>A dynamic approach is essential to make a strong protection level. This is a reason why you need to rely on the best solution providers of recent decades. Many strong security companies are now available to offer the most effective as well as user-friendly <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/pricing.html\\\">passwordless authentication<\/A><\/STRONG> solutions. Use <STRONG><A href=\\\"https:\/\/www.cybernexa.com\/\\\">Cylock MFA<\/A><\/STRONG>, a security product powered by Cybernexa, which is the leading solution provider for several organizations to cope up with their security demands. Attacks from existing solutions like OTP hardware tokens, SMS OTP, and phone OTP may not offer complete protection against several attacks. In such conditions, out-of-band authentication will be the preferable approach in many different areas.<\/P>\\n                            <\/DIV>\\n                            <DIV class=\\\"author-profile\\\">\\n                                  \\t<DIV class=\\\"profile-image\\\">\\n    \\t<IMG alt=\\\"\\\" src=\\\"https:\/\/secure.gravatar.com\/avatar\/eaab9ebeba959e9a992440bee75c1221?s=96&amp;d=mm&amp;r=g\\\" class=\\\"avatar avatar-96 photo\\\" height=\\\"96\\\" width=\\\"96\\\" loading=\\\"lazy\\\"\/>  \\t<\/DIV>\\n  \\t<DIV class=\\\"profile-content heading-styl\\\">\\n    \\t<P class=\\\"highlight\\\">Written By\",\r\n  \"url\": \"https:\/\/www.cybernexa.com\/blog\/why-do-you-need-2fa-and-what-is-it-all-about\/\",\r\n  \"publisher\": {\r\n    \"@type\": \"Organization\",\r\n    \"name\": \"Cybernexa\"\r\n  }\r\n}\r\n<\/script>\t\t<\/div>\r\n\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t<\/div>\r\n\t\t\t\t\t\t\t<\/div>\r\n\t\t<\/section>\r\n\t\t\t\t\t\t<\/div>\r\n\t\t\t\t\t<\/div>\r\n\t\t","protected":false},"excerpt":{"rendered":"<p>How safe my username and password is? This is the common question that runs in the minds of people all around the world. Is everyone is satisfied with their digital security? In this present scenario, the answer is a big `No\u2019. Digital intruders are high in recent years; we can glimpse the different terrific news about data breaches in several [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":195,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[4],"tags":[5,26,20,23,27,13,18,17,8,9,24,19,2,22,6,16],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/posts\/60"}],"collection":[{"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/comments?post=60"}],"version-history":[{"count":16,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/posts\/60\/revisions"}],"predecessor-version":[{"id":377,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/posts\/60\/revisions\/377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/media\/195"}],"wp:attachment":[{"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/media?parent=60"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/categories?post=60"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.cybernexa.com\/blog\/wp-json\/wp\/v2\/tags?post=60"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}