{"id":7369,"date":"2026-02-27T10:29:36","date_gmt":"2026-02-27T15:29:36","guid":{"rendered":"https:\/\/www.is-t.net\/blog\/?p=7369"},"modified":"2026-02-27T10:35:46","modified_gmt":"2026-02-27T15:35:46","slug":"common-financial-phishing-scenarios-are-on-the-rise-beware","status":"publish","type":"post","link":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/","title":{"rendered":"Common Financial Phishing Scenarios Are On The Rise Beware"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"7369\" class=\"elementor elementor-7369\" data-elementor-post-type=\"post\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-022001c elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"022001c\" data-element_type=\"section\" data-e-type=\"section\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-24a6c3c\" data-id=\"24a6c3c\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-226aa6d elementor-widget elementor-widget-image\" data-id=\"226aa6d\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<img fetchpriority=\"high\" decoding=\"async\" width=\"800\" height=\"400\" src=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg\" class=\"attachment-large size-large wp-image-5845\" alt=\"What are Phishing Scams?\" srcset=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg 800w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams-300x150.jpg 300w, https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams-768x384.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/>\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-1e47831 elementor-widget elementor-widget-text-editor\" data-id=\"1e47831\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>Dear Valued Clients,<\/p><p>We are seeing a significant increase in phishing emails specifically designed to trick businesses into sending money. These emails often impersonate executives, vendors, payroll contacts, or even trusted partners and urgently request wire transfers, ACH payments, or gift card purchases.<\/p><p>These attacks are sophisticated and can look very convincing. In many cases, the sender\u2019s name appears correct, but the email address is slightly altered.<br \/><br \/><strong>Common Financial Phishing Scenarios<\/strong><strong><br \/><\/strong><\/p><p>Please be cautious of emails that:<\/p><ul><li>Request an urgent wire transfer or ACH payment<\/li><li>Ask you to change vendor payment information<\/li><li>Instruct you to purchase gift cards for a client, executive, or employee<\/li><li>Claim an invoice is overdue and demand immediate payment<\/li><li>Appear to come from a company executive asking for a confidential financial transaction<\/li><\/ul><p>Attackers rely on urgency and secrecy to prevent verification.<\/p><p><strong>How to Protect Your Business<\/strong><strong><br \/><\/strong><\/p><p><strong>\u2714<\/strong> Always verify financial requests verbally.<\/p><p>Call the person directly using a known phone number \u2014 not the number listed in the suspicious email.<\/p><p><strong>\u2714<\/strong> Confirm vendor payment changes through a second method.<\/p><p>Never rely solely on email to update ACH or wire instructions.<\/p><p><strong>\u2714<\/strong> Be cautious of urgency.<\/p><p>Phrases like \u201cI need this done immediately\u201d or \u201cI\u2019m in a meeting, just handle it\u201d are red flags.<\/p><p><strong>\u2714<\/strong> Enable Multi-Factor Authentication (MFA).<\/p><p>MFA significantly reduces the risk of compromised accounts being used for fraud.<\/p><p><strong>\u2714<\/strong> Train your team.<\/p><p>Ensure anyone involved in accounts payable or payroll understands these risks.<\/p><p><strong>\u2714<\/strong> Report suspicious emails immediately.<\/p><p>Forward them to our support team so we can investigate before damage occurs.<\/p><p><strong>A Simple Rule to Remember<\/strong><strong><br \/><\/strong><\/p><p>If money is involved, slow down and verify.<\/p><p>Legitimate financial requests will withstand proper verification procedures.<\/p><p>Business email compromise is one of the fastest-growing cybercrimes, but with the right safeguards in place, it is also preventable.<\/p><p>If you would like to review your current security protections, <strong>implement MFA<\/strong>, or discuss additional safeguards for your financial processes, please reach out to us. <br \/>We are here to help protect your business.<\/p><p>Stay vigilant,<\/p><p>The IS&amp;T Team<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Dear Valued Clients, We are seeing a significant increase in phishing emails specifically designed to trick businesses into sending money. These emails often impersonate executives, vendors, payroll contacts, or even trusted partners and urgently request wire transfers, ACH payments, or gift card purchases. These attacks are sophisticated and can look very convincing. In many cases, [&hellip;]<\/p>\n","protected":false},"author":7,"featured_media":5845,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"cybocfi_hide_featured_image":"","footnotes":""},"categories":[44],"tags":[],"class_list":["post-7369","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog<\/title>\n<meta name=\"description\" content=\"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog\" \/>\n<meta property=\"og:description\" content=\"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/\" \/>\n<meta property=\"og:site_name\" content=\"IS&amp;T Blog\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-27T15:29:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T15:35:46+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Scott Lard\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Scott Lard\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/\"},\"author\":{\"name\":\"Scott Lard\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\"},\"headline\":\"Common Financial Phishing Scenarios Are On The Rise Beware\",\"datePublished\":\"2026-02-27T15:29:36+00:00\",\"dateModified\":\"2026-02-27T15:35:46+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/\"},\"wordCount\":342,\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Phising-Scams.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/\",\"name\":\"Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Phising-Scams.jpg\",\"datePublished\":\"2026-02-27T15:29:36+00:00\",\"dateModified\":\"2026-02-27T15:35:46+00:00\",\"description\":\"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Phising-Scams.jpg\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2024\\\/03\\\/Phising-Scams.jpg\",\"width\":800,\"height\":400,\"caption\":\"What are Phishing Scams?\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/common-financial-phishing-scenarios-are-on-the-rise-beware\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Common Financial Phishing Scenarios Are On The Rise Beware\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"name\":\"IS&amp;T Blog\",\"description\":\"News for nerds, stuff that matters\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#organization\",\"name\":\"IS&T Consulting Group, LLC\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/04\\\/ist-logo.png\",\"width\":125,\"height\":47,\"caption\":\"IS&T Consulting Group, LLC\"},\"image\":{\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.is-t.net\\\/blog\\\/#\\\/schema\\\/person\\\/01b75441ccfa116bc0ca0750c112b0fa\",\"name\":\"Scott Lard\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g\",\"caption\":\"Scott Lard\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog","description":"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/","og_locale":"en_US","og_type":"article","og_title":"Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog","og_description":"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.","og_url":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/","og_site_name":"IS&amp;T Blog","article_published_time":"2026-02-27T15:29:36+00:00","article_modified_time":"2026-02-27T15:35:46+00:00","og_image":[{"width":800,"height":400,"url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg","type":"image\/jpeg"}],"author":"Scott Lard","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Scott Lard","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#article","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/"},"author":{"name":"Scott Lard","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa"},"headline":"Common Financial Phishing Scenarios Are On The Rise Beware","datePublished":"2026-02-27T15:29:36+00:00","dateModified":"2026-02-27T15:35:46+00:00","mainEntityOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/"},"wordCount":342,"publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/","url":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/","name":"Common Financial Phishing Scenarios Are On The Rise Beware - IS&amp;T Blog","isPartOf":{"@id":"https:\/\/www.is-t.net\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#primaryimage"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#primaryimage"},"thumbnailUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg","datePublished":"2026-02-27T15:29:36+00:00","dateModified":"2026-02-27T15:35:46+00:00","description":"Protect yourself from Phising scenarios that are becoming more and more common. Businesses are getting targeted.","breadcrumb":{"@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#primaryimage","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2024\/03\/Phising-Scams.jpg","width":800,"height":400,"caption":"What are Phishing Scams?"},{"@type":"BreadcrumbList","@id":"https:\/\/www.is-t.net\/blog\/common-financial-phishing-scenarios-are-on-the-rise-beware\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.is-t.net\/blog\/"},{"@type":"ListItem","position":2,"name":"Common Financial Phishing Scenarios Are On The Rise Beware"}]},{"@type":"WebSite","@id":"https:\/\/www.is-t.net\/blog\/#website","url":"https:\/\/www.is-t.net\/blog\/","name":"IS&amp;T Blog","description":"News for nerds, stuff that matters","publisher":{"@id":"https:\/\/www.is-t.net\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.is-t.net\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.is-t.net\/blog\/#organization","name":"IS&T Consulting Group, LLC","url":"https:\/\/www.is-t.net\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","contentUrl":"https:\/\/www.is-t.net\/blog\/wp-content\/uploads\/2019\/04\/ist-logo.png","width":125,"height":47,"caption":"IS&T Consulting Group, LLC"},"image":{"@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.is-t.net\/blog\/#\/schema\/person\/01b75441ccfa116bc0ca0750c112b0fa","name":"Scott Lard","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/2c0683505b829c2570608ebccf5e242e6b3ea32fa4eb9649ac8d6734b5480367?s=96&d=mm&r=g","caption":"Scott Lard"}}]}},"_links":{"self":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/7369","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/comments?post=7369"}],"version-history":[{"count":10,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/7369\/revisions"}],"predecessor-version":[{"id":7379,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/posts\/7369\/revisions\/7379"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media\/5845"}],"wp:attachment":[{"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/media?parent=7369"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/categories?post=7369"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.is-t.net\/blog\/wp-json\/wp\/v2\/tags?post=7369"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}