{"id":1857,"date":"2019-02-23T19:50:25","date_gmt":"2019-02-23T19:50:25","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1857"},"modified":"2019-05-26T18:13:24","modified_gmt":"2019-05-26T18:13:24","slug":"how-to-protect-sensitive-files-on-your-computer","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/","title":{"rendered":"How to Protect Sensitive Files on Your Computer?"},"content":{"rendered":"<p>Every day we keep store more and more files on our computers. Most of them are only useful for a certain period of time, whereas other sensitive files are so important or valuable that we want to keep them forever. A\u00a0sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web. This time we come up with a few simple and easy to follow steps on how to protect sensitive files on your computer.<\/p>\n<p>Unauthorised access to the information on your computer or portable storage devices can be carried out remotely, if the &#8216;intruder&#8217; is able to read or modify your data over the Internet; or physically, if he manages to get hold of your hardware.<\/p>\n<p>You can protect yourself against either type of threat by improving the physical and network security of your data.\u00a0It is always best to have several layers of defence, however, which is why you should also protect the files themselves. That way, your sensitive information is likely to remain safe even if your other security efforts prove inadequate.<\/p>\n<p>Here are a few tips that will help,<\/p>\n<h3>Take regular backups<\/h3>\n<p>Often said, but just as often neglected. Take regular backups! These days almost everybody has at least one external hard disk lying around, there are good easy-to-use backup utilities available and there are several online backup services around. There is no excuse to keep neglecting backing up your important files.<\/p>\n<h3>Use file recovery software<\/h3>\n<p>Save your files from accidental deletions and hard disk crashes by installing\u00a0<a href=\"https:\/\/en.wikipedia.org\/wiki\/Data_recovery\">file recovery software<\/a>. When you want to recover deleted files, it is all about doing this as soon as possible while using your computer as little as possible. Having file recovery software installed will save you a lot of unnecessary stress and is the best guarantee that you\u2019ll quickly recover lost or deleted files.<\/p>\n<h3>Use a <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/file-shredder\/\">file shredder<\/a> to permanently delete files<\/h3>\n<p>Did you pass on your old computer or SD card to your little nephew? Did you sell your smartphone on eBay? Simply formatting your hard disk or SD card will not\u00a0<a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-delete-your-files-permanently-using-kruptos-2-professional\/\">delete files permanently<\/a>. They will be easily recoverably with file recovery software. If you can use file recovery software to recover files, so can everybody else. Use a file shredder utility to permanently delete files you don\u2019t want others to find.<\/p>\n<h3>Password-protect your private files<\/h3>\n<p>Do you share your computer? Even when every user has their own user account, it is still possible to access files from another user account. If you share your home or office computer, you might want to consider <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/2-ways-to-keep-your-sensitive-files-safe-on-a-usb-drive-or-external-hard-drive\/\">password-protecting your private files<\/a>. You can even password-protect whole directories. Just make sure you don\u2019t lose your password. Trust me, it\u2019s a good idea to take the storage of your important and private files seriously.<\/p>\n<p>Following these four simple tips will prevent you from losing your important files and make sure your private files stay private.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day we keep store more and more files on our computers. Most of them are only useful for a certain period of time, whereas other sensitive files are so important or valuable that we want to keep them forever. A\u00a0sensitive file exposure vulnerability is a situation where a file that is supposed to be &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\"> <span class=\"screen-reader-text\">How to Protect Sensitive Files on Your Computer?<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":1860,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7],"tags":[],"class_list":["post-1857","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-23T19:50:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-26T18:13:24+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"561\" \/>\n\t<meta property=\"og:image:height\" content=\"267\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Candy Ross\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Candy Ross\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\"},\"author\":{\"name\":\"Candy Ross\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\"},\"headline\":\"How to Protect Sensitive Files on Your Computer?\",\"datePublished\":\"2019-02-23T19:50:25+00:00\",\"dateModified\":\"2019-05-26T18:13:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\"},\"wordCount\":510,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg\",\"articleSection\":[\"Data Protection\",\"How To\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\",\"name\":\"How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg\",\"datePublished\":\"2019-02-23T19:50:25+00:00\",\"dateModified\":\"2019-05-26T18:13:24+00:00\",\"description\":\"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg\",\"width\":561,\"height\":267,\"caption\":\"how to protect sensitive files\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Sensitive Files on Your Computer?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\",\"name\":\"Candy Ross\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"caption\":\"Candy Ross\"},\"description\":\"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.\",\"sameAs\":[\"http:\/\/www.kruptos2.com\"],\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog","description":"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog","og_description":"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.","og_url":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-02-23T19:50:25+00:00","article_modified_time":"2019-05-26T18:13:24+00:00","og_image":[{"width":561,"height":267,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg","type":"image\/jpeg"}],"author":"Candy Ross","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Candy Ross","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/"},"author":{"name":"Candy Ross","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb"},"headline":"How to Protect Sensitive Files on Your Computer?","datePublished":"2019-02-23T19:50:25+00:00","dateModified":"2019-05-26T18:13:24+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/"},"wordCount":510,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg","articleSection":["Data Protection","How To"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/","url":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/","name":"How to Protect Sensitive Files on Your Computer? - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg","datePublished":"2019-02-23T19:50:25+00:00","dateModified":"2019-05-26T18:13:24+00:00","description":"Learn how to protect sensitive files. A sensitive file exposure vulnerability is a situation where a file that is supposed to be private is accessible to the outside world via your web.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/02\/file-protection.jpg","width":561,"height":267,"caption":"how to protect sensitive files"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/how-to-protect-sensitive-files-on-your-computer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Sensitive Files on Your Computer?"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb","name":"Candy Ross","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","caption":"Candy Ross"},"description":"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.","sameAs":["http:\/\/www.kruptos2.com"],"url":"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1857","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1857"}],"version-history":[{"count":9,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1857\/revisions"}],"predecessor-version":[{"id":1946,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1857\/revisions\/1946"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1860"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1857"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1857"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1857"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}