{"id":56,"date":"2005-02-08T09:57:00","date_gmt":"2005-02-08T09:57:00","guid":{"rendered":"http:\/\/markwilson.me.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm"},"modified":"2007-07-08T14:18:13","modified_gmt":"2007-07-08T13:18:13","slug":"five-ways-to-help-protect-your","status":"publish","type":"post","link":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","title":{"rendered":"Five ways to help protect your identity"},"content":{"rendered":"<p><!--110785709014967659--><\/p>\n<p>A few months back I wrote about the <a href=\"http:\/\/www.microsoft.com\/atwork\/\">Microsoft At Work<\/a> microsite and its advice for <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2004\/12\/best-practices-for-maintaining-your.htm\">maintaining your computer at work<\/a>. It may be a little high level &#8211; but it is aimed at end users and that in itself is good because us techies are generally not too good at communicating with non-technical people.<\/p>\n<p>Microsoft At Work has a sister microsite &#8211; <a href=\"http:\/\/www.microsoft.com\/athome\/\">Microsoft At Home<\/a>. Again, it&#8217;s full of practical advice, but is more consumer-focused and one of the articles that caught my eye recently discusses <a href=\"http:\/\/www.microsoft.com\/athome\/security\/email\/phishing.mspx\">avoiding phishing scams<\/a>. Phishing is a rapidly increasing form of online crime concerned with identity theft. In a phishing scam, a malicious person attempts to obtain personal information such as credit card numbers, passwords, account information, or other personal information by convincing the end user to give it to them under false pretences. Phishing schemes usually come via spam e-mail or pop-up windows.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A few months back I wrote about the Microsoft At Work microsite and its advice for maintaining your computer at work. It may be a little high level &#8211; but it is aimed at end users and that in itself is good because us techies are generally not too good at communicating with non-technical people. &hellip; <a href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Five ways to help protect your identity<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[],"tags":[43],"class_list":["post-56","post","type-post","status-publish","format-standard","hentry","tag-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Five ways to help protect your identity  - markwilson.it<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Five ways to help protect your identity  - markwilson.it\" \/>\n<meta property=\"og:description\" content=\"A few months back I wrote about the Microsoft At Work microsite and its advice for maintaining your computer at work. It may be a little high level &#8211; but it is aimed at end users and that in itself is good because us techies are generally not too good at communicating with non-technical people. &hellip; Continue reading Five ways to help protect your identity\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm\" \/>\n<meta property=\"og:site_name\" content=\"markwilson.it\" \/>\n<meta property=\"article:published_time\" content=\"2005-02-08T09:57:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2007-07-08T13:18:13+00:00\" \/>\n<meta name=\"author\" content=\"Mark Wilson\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:site\" content=\"@markwilsonit\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mark Wilson\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm\"},\"author\":{\"name\":\"Mark Wilson\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"headline\":\"Five ways to help protect your identity\",\"datePublished\":\"2005-02-08T09:57:00+00:00\",\"dateModified\":\"2007-07-08T13:18:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm\"},\"wordCount\":158,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"keywords\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm\",\"name\":\"Five ways to help protect your identity - markwilson.it\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\"},\"datePublished\":\"2005-02-08T09:57:00+00:00\",\"dateModified\":\"2007-07-08T13:18:13+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/2005\\\/02\\\/five-ways-to-help-protect-your.htm#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Five ways to help protect your identity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/\",\"name\":\"markwilson.it\",\"description\":\"get-info -class technology | write-output &gt; \\\/dev\\\/web\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/#\\\/schema\\\/person\\\/98f61365e7c39d6be942174b8c4de468\",\"name\":\"Mark Wilson\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\",\"width\":800,\"height\":800,\"caption\":\"Mark Wilson\"},\"logo\":{\"@id\":\"https:\\\/\\\/i0.wp.com\\\/www.markwilson.co.uk\\\/blog\\\/uploads\\\/image-4.png?fit=800%2C800&ssl=1\"},\"description\":\"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.\",\"sameAs\":[\"http:\\\/\\\/www.markwilson.co.uk\\\/\",\"https:\\\/\\\/www.instagram.com\\\/markwilsonuk\\\/\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/markawilson\\\/\",\"https:\\\/\\\/x.com\\\/markwilsonit\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCWHlZCoHRTocdvtrOJ2IL4A\"],\"url\":\"https:\\\/\\\/www.markwilson.co.uk\\\/blog\\\/author\\\/mark-wilson\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Five ways to help protect your identity  - markwilson.it","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","og_locale":"en_GB","og_type":"article","og_title":"Five ways to help protect your identity  - markwilson.it","og_description":"A few months back I wrote about the Microsoft At Work microsite and its advice for maintaining your computer at work. It may be a little high level &#8211; but it is aimed at end users and that in itself is good because us techies are generally not too good at communicating with non-technical people. &hellip; Continue reading Five ways to help protect your identity","og_url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","og_site_name":"markwilson.it","article_published_time":"2005-02-08T09:57:00+00:00","article_modified_time":"2007-07-08T13:18:13+00:00","author":"Mark Wilson","twitter_card":"summary_large_image","twitter_creator":"@markwilsonit","twitter_site":"@markwilsonit","twitter_misc":{"Written by":"Mark Wilson","Estimated reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm#article","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm"},"author":{"name":"Mark Wilson","@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"headline":"Five ways to help protect your identity","datePublished":"2005-02-08T09:57:00+00:00","dateModified":"2007-07-08T13:18:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm"},"wordCount":158,"commentCount":0,"publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"keywords":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm","name":"Five ways to help protect your identity - markwilson.it","isPartOf":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#website"},"datePublished":"2005-02-08T09:57:00+00:00","dateModified":"2007-07-08T13:18:13+00:00","breadcrumb":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/five-ways-to-help-protect-your.htm#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.markwilson.co.uk\/blog"},{"@type":"ListItem","position":2,"name":"Five ways to help protect your identity"}]},{"@type":"WebSite","@id":"https:\/\/www.markwilson.co.uk\/blog\/#website","url":"https:\/\/www.markwilson.co.uk\/blog\/","name":"markwilson.it","description":"get-info -class technology | write-output &gt; \/dev\/web","publisher":{"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.markwilson.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":["Person","Organization"],"@id":"https:\/\/www.markwilson.co.uk\/blog\/#\/schema\/person\/98f61365e7c39d6be942174b8c4de468","name":"Mark Wilson","image":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","url":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1","width":800,"height":800,"caption":"Mark Wilson"},"logo":{"@id":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/image-4.png?fit=800%2C800&ssl=1"},"description":"A Chartered IT Professional, with recent experience in technology leadership, IT strategy and practice management roles, Mark Wilson is an Enterprise Architect in the Advisory and Management Group at risual. During a career spanning more than two decades, Mark has gained widespread recognition as an expert in his field including both industry and national press exposure. In addition to certifications from Microsoft, VMware, Red Hat, The Open Group and Axelos, Mark held a Microsoft Most Valuable Professional (MVP) award for three years and is now part of the MVP Reconnect programme. Mark is also well-known on social media and maintains an award-winning blog.","sameAs":["http:\/\/www.markwilson.co.uk\/","https:\/\/www.instagram.com\/markwilsonuk\/","https:\/\/www.linkedin.com\/in\/markawilson\/","https:\/\/x.com\/markwilsonit","https:\/\/www.youtube.com\/channel\/UCWHlZCoHRTocdvtrOJ2IL4A"],"url":"https:\/\/www.markwilson.co.uk\/blog\/author\/mark-wilson"}]}},"jetpack_featured_media_url":"","jetpack-related-posts":[{"id":742,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/03\/phishing-and-wider-issue-of-identity.htm","url_meta":{"origin":56,"position":0},"title":"Phishing and the wider issue of identity theft","author":"Mark Wilson","date":"Tuesday 29 March 2005","format":false,"excerpt":"Phishing worries me. In fact, identity theft in general is one of my major concerns (and is the reason I refuse to do any more business with Halifax Bank of Scotland, one of the UK's largest banks, who will not respond to letters or e-mails requesting that they remove my\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"http:\/\/www.tqlkg.com\/image-1875354-8132995","width":350,"height":200},"classes":[]},{"id":173,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/09\/office-2003-sp2-and-anti-phishing.htm","url_meta":{"origin":56,"position":1},"title":"Office 2003 SP2 and anti-phishing protection for Outlook 2003 released","author":"Mark Wilson","date":"Wednesday 28 September 2005","format":false,"excerpt":"Yesterday, Microsoft released Office 2003 Service Pack 2 (SP2). SP2 is basically a rollup of fixes for Office (full technical details can be found in Microsoft knowledge base article 887616) but it also includes enhancements to Outlook 2003's Junk E-mail Filter to provide protection against phishing attacks, automatically evaluating any\u2026","rel":"","context":"In \"Microsoft Office\"","block_context":{"text":"Microsoft Office","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/office"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":9060,"url":"https:\/\/www.markwilson.co.uk\/blog\/2025\/06\/i-got-phished-and-i-should-have-known-better.htm","url_meta":{"origin":56,"position":2},"title":"I got phished \u2013 and I should have known better","author":"Mark Wilson","date":"Tuesday 10 June 2025","format":false,"excerpt":"After decades working in IT, I really should have known better. I do the training. Every year, like everyone else, I click through the e-learning as quickly as I can, answer the quiz at the end, and move on to something else. I've even been that person who feels suitably\u2026","rel":"","context":"In &quot;Technology&quot;","block_context":{"text":"Technology","link":"https:\/\/www.markwilson.co.uk\/blog\/topic\/technology"},"img":{"alt_text":"","src":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=350%2C200","width":350,"height":200,"srcset":"https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=350%2C200 1x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=525%2C300 1.5x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=700%2C400 2x, https:\/\/i0.wp.com\/www.markwilson.co.uk\/blog\/uploads\/ChatGPT-Image-Jun-9-2025-04_34_14-PM.png?fit=1200%2C800&ssl=1&resize=1050%2C600 3x"},"classes":[]},{"id":162,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/08\/new-features-for-msn-toolbar.htm","url_meta":{"origin":56,"position":3},"title":"New features for the MSN toolbar","author":"Mark Wilson","date":"Tuesday 30 August 2005","format":false,"excerpt":"Last week, Paul Thurrott reported in the Windows IT Pro magazine network WinInfo Daily Update that MSN have begun beta testing of an add-on for the MSN toolbar called roaming favorites, allowing users to manage, search, and access Internet Explorer (IE) favorites whatever PC is in use, as long as\u2026","rel":"","context":"In \"Microsoft Windows Live\/MSN\"","block_context":{"text":"Microsoft Windows Live\/MSN","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/windows-live"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":66,"url":"https:\/\/www.markwilson.co.uk\/blog\/2005\/02\/child-safety-online.htm","url_meta":{"origin":56,"position":4},"title":"Child safety online","author":"Mark Wilson","date":"Thursday 24 February 2005","format":false,"excerpt":"In previous posts I've mentioned both the Microsoft at work and Microsoft at home microsites. Today I was directed to a new microsite - security at home, specifically the child safety online section. I'm not sure if the world is really any more dangerous for children than it was when\u2026","rel":"","context":"In \"Security\"","block_context":{"text":"Security","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/security"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":611,"url":"https:\/\/www.markwilson.co.uk\/blog\/2006\/11\/sysinternals-is-back-online.htm","url_meta":{"origin":56,"position":5},"title":"Sysinternals is back online","author":"Mark Wilson","date":"Monday 20 November 2006","format":false,"excerpt":"A few months back, Microsoft bought Winternals - including Mark Russinovich and Bryce Cogswell's highly-regarded Sysinternals website with many utilities considered essential by Windows administrators. The site then went offline for a few months but it's now back in the form of the Microsoft Technet: Windows Sysinternals microsite.","rel":"","context":"In \"Useful Websites\"","block_context":{"text":"Useful Websites","link":"https:\/\/www.markwilson.co.uk\/blog\/tag\/useful-websites"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/56","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=56"}],"version-history":[{"count":0,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/posts\/56\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.markwilson.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}