{"id":2654,"date":"2021-02-19T02:32:28","date_gmt":"2021-02-19T02:32:28","guid":{"rendered":"https:\/\/www.dssitservices.com\/?p=2654"},"modified":"2021-02-19T03:25:30","modified_gmt":"2021-02-19T03:25:30","slug":"weekly-security-tip-what-is-social-engineering","status":"publish","type":"post","link":"https:\/\/www.dssitservices.com\/sq\/blog\/weekly-security-tip-what-is-social-engineering\/","title":{"rendered":"Weekly Security Tip: What is Social Engineering?"},"content":{"rendered":"<section class=\"wpb-content-wrapper\"><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<p>Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.<\/p>\n<p>In this week\u2019s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for.<\/p>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_video_widget wpb_content_element vc_clearfix   vc_video-aspect-ratio-169 vc_video-el-width-100 vc_video-align-center\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t\n\t\t\t<div class=\"wpb_video_wrapper\"><iframe loading=\"lazy\" src=\"https:\/\/player.vimeo.com\/video\/513597695?dnt=1&amp;app_id=122963\" width=\"900\" height=\"506\" frameborder=\"0\" allow=\"autoplay; fullscreen; picture-in-picture; clipboard-write; encrypted-media; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\"><\/iframe><\/div>\n\t\t<\/div>\n\t<\/div>\n<div class=\"vc_empty_space\"   style=\"height: 32px\"><span class=\"vc_empty_space_inner\"><\/span><\/div><\/div><\/div><\/div><\/div><div class=\"vc_row wpb_row vc_row-fluid\"><div class=\"wpb_column vc_column_container vc_col-sm-12\"><div class=\"vc_column-inner\"><div class=\"wpb_wrapper\">\n\t<div class=\"wpb_text_column wpb_content_element\" >\n\t\t<div class=\"wpb_wrapper\">\n\t\t\t<table width=\"100%\">\n<tbody>\n<tr>\n<td>\n<h1 style=\"text-align: center;\">Quick Tips<\/h1>\n<ul>\n<li>Watch out for threatening language during phone calls and emails.<\/li>\n<li>Offering prizes or free gifts is a common social engineering tactic.<\/li>\n<\/ul>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<table width=\"100%\">\n<tbody>\n<tr>\n<td><strong>What is an Employee Secure Score (ESS)?<\/strong><br \/>\nThink of the ESS like a credit rating for how secure you are. The lower the ESS the more likely you are to fall for a scam, phishing attack or be a victim of a data breach. The higher the ESS the more likely you are to spot scams and defend against data breaches.To learn how to improve your ESS, open or paste the link into your browser\u00a0to watch a short video:\u00a0\u00a0<a href=\"https:\/\/player.vimeo.com\/video\/275662303\" data-toggle=\"tooltip\">https:\/\/player.vimeo.com\/video\/275662303<\/a><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n\n\t\t<\/div>\n\t<\/div>\n<\/div><\/div><\/div><\/div>\n<\/section>","protected":false},"excerpt":{"rendered":"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered. In this week\u2019s security tip video, learn some common social engineering tactics used by cybercriminals and some of the red flags you should look out for. Quick Tips Watch out for threatening language during phone calls and [...]","protected":false},"author":3,"featured_media":2655,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[121],"tags":[],"class_list":["post-2654","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-weekly-security-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Weekly Security Tip: What is Social Engineering? | DSS Management Inc.<\/title>\n<meta name=\"description\" content=\"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.dssitservices.com\/sq\/blog\/weekly-security-tip-what-is-social-engineering\/\" \/>\n<meta property=\"og:locale\" content=\"sq_AL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Weekly Security Tip: What is Social Engineering? | DSS Management Inc.\" \/>\n<meta property=\"og:description\" content=\"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.dssitservices.com\/sq\/blog\/weekly-security-tip-what-is-social-engineering\/\" \/>\n<meta property=\"og:site_name\" content=\"DSS - IT &amp; Cyber Security Management\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/DSSIT\" \/>\n<meta property=\"article:published_time\" content=\"2021-02-19T02:32:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-02-19T03:25:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Dashmir\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Dashmir\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minut\u00eb\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/\"},\"author\":{\"name\":\"Dashmir\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\"},\"headline\":\"Weekly Security Tip: What is Social Engineering?\",\"datePublished\":\"2021-02-19T02:32:28+00:00\",\"dateModified\":\"2021-02-19T03:25:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/\"},\"wordCount\":210,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg\",\"articleSection\":[\"Weekly Security Tips\"],\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/\",\"name\":\"Weekly Security Tip: What is Social Engineering? | DSS Management Inc.\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg\",\"datePublished\":\"2021-02-19T02:32:28+00:00\",\"dateModified\":\"2021-02-19T03:25:30+00:00\",\"description\":\"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#breadcrumb\"},\"inLanguage\":\"sq\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2021\\\/02\\\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg\",\"width\":600,\"height\":300,\"caption\":\"Cyber Security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/blog\\\/weekly-security-tip-what-is-social-engineering\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.dssitservices.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Weekly Security Tip: What is Social Engineering?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#website\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"name\":\"DSS - IT & Cyber Security Management\",\"description\":\"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.dssitservices.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"sq\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#organization\",\"name\":\"DSS Management Inc\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"contentUrl\":\"https:\\\/\\\/www.dssitservices.com\\\/wp-content\\\/uploads\\\/2019\\\/01\\\/DSS-Logo-Main-1-1.png\",\"width\":297,\"height\":100,\"caption\":\"DSS Management Inc\"},\"image\":{\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/DSSIT\",\"https:\\\/\\\/www.instagram.com\\\/dssit\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/dssitinc\\\/\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCUfIRO4HxMQ2vLpza29n0Vg\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.dssitservices.com\\\/#\\\/schema\\\/person\\\/e9b3d9606a136b2363eab4eac99de778\",\"name\":\"Dashmir\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"sq\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g\",\"caption\":\"Dashmir\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Weekly Security Tip: What is Social Engineering? | DSS Management Inc.","description":"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.dssitservices.com\/sq\/blog\/weekly-security-tip-what-is-social-engineering\/","og_locale":"sq_AL","og_type":"article","og_title":"Weekly Security Tip: What is Social Engineering? | DSS Management Inc.","og_description":"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.","og_url":"https:\/\/www.dssitservices.com\/sq\/blog\/weekly-security-tip-what-is-social-engineering\/","og_site_name":"DSS - IT &amp; Cyber Security Management","article_publisher":"https:\/\/www.facebook.com\/DSSIT","article_published_time":"2021-02-19T02:32:28+00:00","article_modified_time":"2021-02-19T03:25:30+00:00","og_image":[{"width":600,"height":300,"url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg","type":"image\/jpeg"}],"author":"Dashmir","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Dashmir","Est. reading time":"1 minut\u00eb"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#article","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/"},"author":{"name":"Dashmir","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778"},"headline":"Weekly Security Tip: What is Social Engineering?","datePublished":"2021-02-19T02:32:28+00:00","dateModified":"2021-02-19T03:25:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/"},"wordCount":210,"commentCount":0,"publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg","articleSection":["Weekly Security Tips"],"inLanguage":"sq","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/","url":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/","name":"Weekly Security Tip: What is Social Engineering? | DSS Management Inc.","isPartOf":{"@id":"https:\/\/www.dssitservices.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#primaryimage"},"image":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#primaryimage"},"thumbnailUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg","datePublished":"2021-02-19T02:32:28+00:00","dateModified":"2021-02-19T03:25:30+00:00","description":"Why are cyber scams so effective? It comes down to social engineering tactics that successful cybercriminals have mastered.","breadcrumb":{"@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#breadcrumb"},"inLanguage":"sq","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/"]}]},{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#primaryimage","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2021\/02\/e473600c-8f13-40cc-a70f-07bfa0cac0b7.jpg","width":600,"height":300,"caption":"Cyber Security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.dssitservices.com\/blog\/weekly-security-tip-what-is-social-engineering\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.dssitservices.com\/"},{"@type":"ListItem","position":2,"name":"Weekly Security Tip: What is Social Engineering?"}]},{"@type":"WebSite","@id":"https:\/\/www.dssitservices.com\/#website","url":"https:\/\/www.dssitservices.com\/","name":"DSS - IT & Cyber Security Management","description":"DSS IT is your trusted partner for IT Services and Cybersecurity on Long Island providing expert managed services and secure network support backed by over 20 years of experience.","publisher":{"@id":"https:\/\/www.dssitservices.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.dssitservices.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"sq"},{"@type":"Organization","@id":"https:\/\/www.dssitservices.com\/#organization","name":"DSS Management Inc","url":"https:\/\/www.dssitservices.com\/","logo":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/","url":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","contentUrl":"https:\/\/www.dssitservices.com\/wp-content\/uploads\/2019\/01\/DSS-Logo-Main-1-1.png","width":297,"height":100,"caption":"DSS Management Inc"},"image":{"@id":"https:\/\/www.dssitservices.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/DSSIT","https:\/\/www.instagram.com\/dssit\/","https:\/\/www.linkedin.com\/company\/dssitinc\/","https:\/\/www.youtube.com\/channel\/UCUfIRO4HxMQ2vLpza29n0Vg"]},{"@type":"Person","@id":"https:\/\/www.dssitservices.com\/#\/schema\/person\/e9b3d9606a136b2363eab4eac99de778","name":"Dashmir","image":{"@type":"ImageObject","inLanguage":"sq","@id":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fd09de9db1f62d8c20869011bc627330173d7184985db150edad593263e4bfcc?s=96&d=mm&r=g","caption":"Dashmir"}}]}},"_links":{"self":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/2654","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/comments?post=2654"}],"version-history":[{"count":0,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/posts\/2654\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media\/2655"}],"wp:attachment":[{"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/media?parent=2654"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/categories?post=2654"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.dssitservices.com\/sq\/wp-json\/wp\/v2\/tags?post=2654"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}