{"id":66969,"date":"2022-05-16T16:45:42","date_gmt":"2022-05-16T13:45:42","guid":{"rendered":"https:\/\/www.mywot.com\/blog\/?p=66969"},"modified":"2025-01-07T11:37:39","modified_gmt":"2025-01-07T09:37:39","slug":"password-monitoring","status":"publish","type":"post","link":"https:\/\/www.mywot.com\/blog\/password-monitoring","title":{"rendered":"How to use Password Monitoring with WOT"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">In today\u2019s day and age, having the right tools to ensure your digital safety and security is key. With that in mind we developed and are thrilled to share our latest feature &#8211; Password Monitoring! If you have an email address, which chances are that you do, as it&#8217;s estimated that there are nearly 4 billion email users worldwide, this feature and helpful blog is for you.&nbsp;<\/span><\/p>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-66967\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password5-800x475.jpg\" alt=\"Password protection\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password5-800x475.jpg 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password5-800x475-300x178.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password5-800x475-768x456.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">Our email addresses provide a direct connection to us and the digital world. They serve as a way to communicate with friends, family and colleagues, and they grant us access and ownership to endless accounts for consumption- whether with media or with physical goods. And because that consumer access can sometimes truly feel limitless, it\u2019s very common that a majority of us use our email addresses for multiple reasons, with multiple logins, across multiple platforms. Platforms like Social Media &#8211; Facebook, Instagram, Twitter &#8211; as well as others like Netflix, Amazon, PayPal, Expedia, and more. It\u2019s for this exact reason that we created this feature. So that you are able to use your email address in multiple places, while being protected along the way. With WOTs Password Monitoring, we\u2019re offering constant privacy protection and account protection. You\u2019ll receive alerts through our <\/span><a href=\"https:\/\/chrome.google.com\/webstore\/detail\/wot-website-security-brow\/bhmmomiinigofkjcapegjjndpbikblnp\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">Chrome extension<\/span><\/a><span style=\"font-weight: 400;\"> if your password was leaked in a data breach as well as what you can do to prevent it from happening again as well as what you can do to begin protecting yourself in that moment.<\/span><\/p>\n<h2><strong>What is a data breach?&nbsp;<\/strong><\/h2>\n<p><span style=\"font-weight: 400;\">A \u201cdata breach\u201d is a common term used to describe any instance where someone gains access to electronic data or confidential information that they were not supposed to. <\/span><a href=\"https:\/\/www.mywot.com\/blog\/email-security-tips\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">If your personal or work email address gets hacked<\/span><\/a><span style=\"font-weight: 400;\">, that is also classified as a data breach. However, data breaches can also happen on a large scale where well-known organizations are targeted for all of the valuable user information they have. Maybe you&#8217;ve even heard of some of the <\/span><a href=\"https:\/\/www.csoonline.com\/article\/2130877\/the-biggest-data-breaches-of-the-21st-century.html\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">largest data breaches in the 21st century<\/span><\/a><span style=\"font-weight: 400;\"> across organizations like LinkedIn, Facebook, the Marriott hotels group and more.&nbsp;<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And while these breaches happened almost 3 years ago in 2019, it can still be quite nerve wracking for all of us operating in the digital world. Especially since in 2021, the nearly 530 million data points leaked from Facebook were posted for free online. Highlighting the criminal intent behind this, and the true need for password safety and awareness. To learn more about password safety, check out our blog covering <a href=\"https:\/\/www.mywot.com\/blog\/strong-password\">strong password best practices<\/a><\/span><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The reason why some of the largest organizations in the world face data breaches is because they are all safely collecting private &#8211; and valuable &#8211; information through their users&#8217; accounts. The data is typically analyzed so they can serve their audience and customers more personalized, relevant experiences. However, because of the type of data collected like Email, passwords, birthdates, personal phone numbers, and more&nbsp; makes for a very tempting purchase from those operating on the <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/Darknet\" target=\"_blank\" rel=\"noopener noreferrer\"><span style=\"font-weight: 400;\">DarkNet<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p>A general rule of thumb is to worry about your cybersecurity and protection before your accounts ever have the chance to become compromised. Which is why it\u2019s important to create a secure plan that will protect you, and your family, or loved ones across all aspects of the internet. And part of doing that is by being proactive, being unique with your passwords, being aware of potential threats, staying educated on new digital safety trends, and using WOTs Password Monitoring feature.<\/p>\n<h2>Here\u2019s How<\/h2>\n<ul>\n<li>Anything you have online that you cannot afford to lose should always be made into backup files. Download or take screenshots of all important documents and save them in secure folders, or on USBs or secure hard drives. William Antonelli, tech reporter and expert for Business Insider suggests to also keep a close eye on your finances by checking your bank statements on a weekly or bi-weekly basis. Antonelli also recommends signing up for a credit monitoring service that will keep track of any suspicious activity within your credit report. The more hands-on and proactive you are, the safer you and your information will be.<\/li>\n<\/ul>\n<ul>\n<li>Be unique with your passwords. This is something we cannot stress enough. Even if you think you have a strong password, you can always double, or even triple check its strength, as well as change it often. It\u2019s always a good practice to make sure you aren\u2019t using the same password across each of your accounts as it\u2019s one of the simplest ways a hacker can have easy and quick access across your accounts.<\/li>\n<\/ul>\n<ul>\n<li>Have fun, but stay cautious. These days, hackers are getting more creative in the ways that they try to steal your data and information. Emails can look like they were sent from Netflix themselves. If you are being asked to submit personal information, or re-enter passwords, always check the sender. It might say @netflix.com but maybe it has one single letter missing within the address. Check the body of the email for typos, additional spaces, too many periods, or strange formatting. These are always indicators that this really didn\u2019t come from Netflix and that someone is trying to steal your information from one simple click. Once you\u2019ve identified that this could be a potential scam, report it as spam so it won\u2019t ever reach your inbox again. If you\u2019re looking for additional tips on how to spot and stop phishing attacks, we\u2019ve got you covered.<\/li>\n<\/ul>\n<ul>\n<li>Utilize our Password Monitoring feature via WOTs Chrome extension and ensure both constant account protection and account monitoring. As part of the extension, we will perform scans every 24 hours to monitor if your email address has been part of a data breach. If so, you will immediately receive an alert and message via the extension to know, and most importantly where the breach took place, so that you\u2019re able to make the necessary changes to secure your account(s) again. We will offer support on how you can avoid these types of breaches in the future, whether it\u2019s by implementing a two-factor authentication software for enhanced password security, or by informing you of the websites you are visiting that could be putting your digital safety at risk. As an added bonus, you\u2019ll also be able to set up auto-scans across your devices so that potential security threats or breaches are detected early.<\/li>\n<\/ul>\n<p><img decoding=\"async\" loading=\"lazy\" class=\"alignnone size-full wp-image-66966\" src=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password2-800x475.jpg\" alt=\"data breach monitoring\" width=\"800\" height=\"475\" srcset=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password2-800x475.jpg 800w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password2-800x475-300x178.jpg 300w, https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password2-800x475-768x456.jpg 768w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>The internet is part of our everyday life. There\u2019s no avoiding it. And while it brings us a lot of benefits, learning, and fun, it\u2019s something we always have to remember to be careful with. Especially from the standpoint of password protection and security as data breaches are only becoming more common. However, a few things that we do have on our side against the world of growing hackers are things like password monitoring, \u2018zero-knowledge encryption\u2019 across organizations, and constant learnings of new ways to create more secure passwords.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>In today\u2019s day and age, having the right tools to ensure your digital safety and security is key. With that in mind we developed and are thrilled to share our latest feature &#8211; Password Monitoring! If you have an email address, which chances are that you do, as it&#8217;s estimated that there are nearly 4 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":66968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_links_to":"","_links_to_target":""},"categories":[40],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.10 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to use Password Monitoring with WOT | WOT<\/title>\n<meta name=\"description\" content=\"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.mywot.com\/blog\/password-monitoring\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to use Password Monitoring with WOT | WOT\" \/>\n<meta property=\"og:description\" content=\"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mywot.com\/blog\/password-monitoring\" \/>\n<meta property=\"og:site_name\" content=\"WOT\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/weboftrust\" \/>\n<meta property=\"article:published_time\" content=\"2022-05-16T13:45:42+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-01-07T09:37:39+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password4-800x475.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"800\" \/>\n\t<meta property=\"og:image:height\" content=\"475\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Aleksandra\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:site\" content=\"@Web_of_Trust\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Aleksandra\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring\"},\"author\":{\"name\":\"Aleksandra\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4\"},\"headline\":\"How to use Password Monitoring with WOT\",\"datePublished\":\"2022-05-16T13:45:42+00:00\",\"dateModified\":\"2025-01-07T09:37:39+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring\"},\"wordCount\":1173,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"articleSection\":[\"Online Privacy Protection\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.mywot.com\/blog\/password-monitoring#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring\",\"url\":\"https:\/\/www.mywot.com\/blog\/password-monitoring\",\"name\":\"How to use Password Monitoring with WOT | WOT\",\"isPartOf\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\"},\"datePublished\":\"2022-05-16T13:45:42+00:00\",\"dateModified\":\"2025-01-07T09:37:39+00:00\",\"description\":\"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mywot.com\/blog\/password-monitoring\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mywot.com\/blog\/password-monitoring#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.mywot.com\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to use Password Monitoring with WOT\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#website\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"name\":\"WOT\",\"description\":\"Safe Web Search &amp; Browsing\",\"publisher\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\"},\"alternateName\":\"WOT\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mywot.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#organization\",\"name\":\"Web of Trust\",\"alternateName\":\"WOT\",\"url\":\"https:\/\/www.mywot.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"contentUrl\":\"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png\",\"width\":395,\"height\":150,\"caption\":\"Web of Trust\"},\"image\":{\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/weboftrust\",\"https:\/\/twitter.com\/Web_of_Trust\",\"https:\/\/www.linkedin.com\/company\/wot-services-ltd.\",\"https:\/\/www.youtube.com\/user\/MyWOT\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4\",\"name\":\"Aleksandra\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g\",\"caption\":\"Aleksandra\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to use Password Monitoring with WOT | WOT","description":"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.mywot.com\/blog\/password-monitoring","og_locale":"en_US","og_type":"article","og_title":"How to use Password Monitoring with WOT | WOT","og_description":"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you","og_url":"https:\/\/www.mywot.com\/blog\/password-monitoring","og_site_name":"WOT","article_publisher":"https:\/\/www.facebook.com\/weboftrust","article_published_time":"2022-05-16T13:45:42+00:00","article_modified_time":"2025-01-07T09:37:39+00:00","og_image":[{"width":800,"height":475,"url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2022\/05\/Password4-800x475.jpg","type":"image\/jpeg"}],"author":"Aleksandra","twitter_card":"summary_large_image","twitter_creator":"@Web_of_Trust","twitter_site":"@Web_of_Trust","twitter_misc":{"Written by":"Aleksandra","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mywot.com\/blog\/password-monitoring#article","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/password-monitoring"},"author":{"name":"Aleksandra","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4"},"headline":"How to use Password Monitoring with WOT","datePublished":"2022-05-16T13:45:42+00:00","dateModified":"2025-01-07T09:37:39+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mywot.com\/blog\/password-monitoring"},"wordCount":1173,"commentCount":0,"publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"articleSection":["Online Privacy Protection"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.mywot.com\/blog\/password-monitoring#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.mywot.com\/blog\/password-monitoring","url":"https:\/\/www.mywot.com\/blog\/password-monitoring","name":"How to use Password Monitoring with WOT | WOT","isPartOf":{"@id":"https:\/\/www.mywot.com\/blog\/#website"},"datePublished":"2022-05-16T13:45:42+00:00","dateModified":"2025-01-07T09:37:39+00:00","description":"If you\u2019ve ever Googled or don\u2019t want to ever Google \u2018did this password appear in a data leak?\u2019 then this blog, and WOTs features, are for you","breadcrumb":{"@id":"https:\/\/www.mywot.com\/blog\/password-monitoring#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mywot.com\/blog\/password-monitoring"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mywot.com\/blog\/password-monitoring#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.mywot.com\/blog"},{"@type":"ListItem","position":2,"name":"How to use Password Monitoring with WOT"}]},{"@type":"WebSite","@id":"https:\/\/www.mywot.com\/blog\/#website","url":"https:\/\/www.mywot.com\/blog\/","name":"WOT","description":"Safe Web Search &amp; Browsing","publisher":{"@id":"https:\/\/www.mywot.com\/blog\/#organization"},"alternateName":"WOT","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mywot.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mywot.com\/blog\/#organization","name":"Web of Trust","alternateName":"WOT","url":"https:\/\/www.mywot.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","contentUrl":"https:\/\/www.mywot.com\/blog\/wp-content\/uploads\/2019\/02\/logo-big.png","width":395,"height":150,"caption":"Web of Trust"},"image":{"@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/weboftrust","https:\/\/twitter.com\/Web_of_Trust","https:\/\/www.linkedin.com\/company\/wot-services-ltd.","https:\/\/www.youtube.com\/user\/MyWOT"]},{"@type":"Person","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/16e0e913f716268ae365d488bdeea6f4","name":"Aleksandra","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mywot.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6b7b7e0370315eb766e78d347cc1439d?s=96&d=mm&r=g","caption":"Aleksandra"}}]}},"_links":{"self":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66969"}],"collection":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/comments?post=66969"}],"version-history":[{"count":21,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66969\/revisions"}],"predecessor-version":[{"id":68101,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/posts\/66969\/revisions\/68101"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media\/66968"}],"wp:attachment":[{"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/media?parent=66969"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/categories?post=66969"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mywot.com\/blog\/wp-json\/wp\/v2\/tags?post=66969"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}