{"id":6956,"date":"2021-03-31T13:57:17","date_gmt":"2021-03-31T13:57:17","guid":{"rendered":"https:\/\/cybersmart.com\/?p=6956"},"modified":"2021-10-06T12:05:07","modified_gmt":"2021-10-06T12:05:07","slug":"everything-you-need-to-know-about-firewalls","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/","title":{"rendered":"Everything you need to know about firewalls"},"content":{"rendered":"

Firewalls can appear complicated at first glance. However, in reality, they\u2019re easy to set up and offer an important defence against cyber threats. So, to help you better understand firewalls and how to protect your business, here\u2019s everything you need to know.\u00a0<\/span><\/p>\n

What is a firewall?\u00a0<\/b><\/h3>\n

A \u2018firewall\u2019 is a tool that protects your home or office systems from malicious traffic on the internet.\u00a0<\/span><\/p>\n

Think of it as a well-armed bouncer, checking anything that enters your network for threats. It creates<\/span>\u00a0a barrier between a \u2018trusted network\u2019 (such as your office) and an \u2018untrusted network\u2019, like the internet.\u00a0<\/span><\/p>\n

Firewalls keep your devices operating reliably. But they also protect you from a variety of threats, such as DoS (Denial of Service) and malicious packet attacks.<\/span><\/p>\n

Most modern devices contain a firewall of some kind. You\u2019ll find one built into your laptop and internet router, although, crucially not on most smartphones. Many businesses also set up a separate hardware firewall in addition to the one built into devices for an extra layer of security.\u00a0<\/span><\/p>\n

Where does the term \u2018firewall\u2019 come from?\u00a0<\/b><\/h3>\n

The term \u2018firewall\u2019 has an interesting history (no, really). The term originally refers to a wall built to contain a fire between <\/span>adjacent buildings. Later, it was used to describe the metal sheet that separates the engine compartment from passengers on an aeroplane.\u00a0<\/span><\/p>\n

It wasn’t until the 1980s that \u2018firewall\u2019 first became synonymous with the internet. The term appeared in the 1983 computer-hacking movie <\/span>WarGames<\/span><\/i> to describe the act of filtering data coming through routers and possibly inspired its later use.<\/span><\/p>\n

How does a firewall work?<\/b><\/h3>\n

Firewalls analyse all incoming traffic based on a set of pre-set rules. The rules are then used to filter out anything malicious or suspicious and prevent attacks.\u00a0<\/span><\/p>\n

The slightly more technical explanation is that firewalls filter traffic at a computer\u2019s entry points or \u2018ports\u2019. These ports are where information is exchanged with external devices. For example, a rule might look something like this:<\/span>
\n<\/span>
\n<\/span>\u201c<\/span>Source address 172.18.1.1 is allowed to reach destination 172.18.2.1 over port 22.”<\/span><\/i><\/p>\n

A great analogy for understanding this is to think of an IP address (the unique number that identifies your device) as a house and port numbers as rooms within the house. Only trusted people (IP addresses) are allowed to enter the house at all. Then, once in the house, trusted people are only allowed to access certain rooms (destination ports).\u00a0<\/span><\/p>\n

It\u2019s much like hosting a party at your house, in that you\u2019d probably keep some rooms off-limits. Perhaps there are some rooms that could pose a threat to children or maybe you just like your privacy, either way, the same basic principle applies to firewalls. Trusted devices are only allowed access to certain places.\u00a0<\/span><\/p>\n

Why are firewalls important?\u00a0<\/b><\/h3>\n

Simply put firewalls are a vital first line of defence. To return to our bouncer analogy from earlier, without a doorman anyone can enter the building. Without a firewall, anyone can get into your business.\u00a0<\/span><\/p>\n

It\u2019s not difficult for even a relatively unsophisticated cybercriminal to probe your organisation\u2019s devices in an attempt to break into your systems. Without a properly configured firewall, they\u2019re much more likely to succeed.\u00a0<\/span><\/p>\n

What\u2019s more, the consequences can be disastrous. Not only will hackers gain access to your data and potentially leak it or use it maliciously, but the financial hit can also be severe. According to insurer Hiscox, the <\/span>average cost of a breach for an SME is \u00a311,000<\/span><\/a>, and that\u2019s before we even consider reputational damage or fines from regulators.\u00a0<\/span><\/p>\n

A properly configured, maintained and monitored firewall will go a long way towards protecting your business.\u00a0<\/span><\/p>\n

But what do we mean by \u2018properly\u2019 configured? Well, for your firewall to work optimally, you need to ensure it has the power to manage normal and encrypted internet traffic without slowing down your devices or compromising security. A good IT support partner can help you do this or, alternatively, automated tools like <\/span>CyberSmart<\/span><\/a> can guide you through the process yourself.\u00a0<\/span><\/p>\n

Firewalls and Cyber Essentials\u00a0<\/b><\/h3>\n

You might be reading this article because you\u2019ve come across the firewalls section of the Cyber Essentials questionnaire. Or perhaps you\u2019re considering completing Cyber Essentials certification for your business.\u00a0<\/span><\/p>\n

Either way, the section of Cyber Essentials dealing with firewalls can appear confusing. But, in reality, it\u2019s very simple. You\u2019ll be asked about which firewalls you have in place, whether they are password protected and \u2018accessible\u2019 services. <\/span>
\n<\/span>
\n<\/span>The first two elements are self-explanatory. All you need do is list the firewalls you use and set up password protection for them if you don\u2019t already have it (the questionnaire or one of our team will provide guidance on how to do this). However, \u2018accessible services\u2019 is a little more complicated.\u00a0<\/span><\/p>\n

What does ‘accessible services’ mean?\u00a0<\/strong><\/h3>\n

\u2018Accessible services\u2019 is the traffic that is approved to pass through the firewall. In an office environment, your firewalls will usually be configured so that IT support can access anything they need to. However, most of us aren\u2019t working in an office at the moment and home routers are often set up to block all services as default.\u00a0<\/span><\/p>\n

Sadly, working from home doesn\u2019t mean the end of all IT troubles, so your remote workers may wish to allow external access to their personal router. If this is the case, then it\u2019s best practice to allow a single, static IP address through the firewall. That way, you can be sure your IT support team, and only the IT support team, has access.\u00a0<\/span><\/p>\n

And that\u2019s all there is to firewalls. Hopefully, this has answered most of your questions but, if there\u2019s anything else you\u2019d like to know, please get in touch with one of our team.<\/span><\/p>\n

 <\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start by getting certified in <\/span>Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/p>\n

\"CTA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Firewalls can appear complicated at first glance. However, in reality, they\u2019re easy to set up and offer an important defence against cyber threats. So, to help you better understand firewalls…<\/p>\n","protected":false},"author":4,"featured_media":6957,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[103,9,150,83,27,16],"yoast_head":"\nEverything you need to know about firewalls - CyberSmart<\/title>\n<meta name=\"description\" content=\"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Everything you need to know about firewalls - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-03-31T13:57:17+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-06T12:05:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\"},\"author\":{\"name\":\"Franklin\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\"},\"headline\":\"Everything you need to know about firewalls\",\"datePublished\":\"2021-03-31T13:57:17+00:00\",\"dateModified\":\"2021-10-06T12:05:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\"},\"wordCount\":999,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg\",\"keywords\":[\"cyber attack\",\"Cyber Essentials\",\"cyber threats\",\"cybersecurity\",\"firewall\",\"SMEs\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\",\"name\":\"Everything you need to know about firewalls - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg\",\"datePublished\":\"2021-03-31T13:57:17+00:00\",\"dateModified\":\"2021-10-06T12:05:07+00:00\",\"description\":\"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg\",\"width\":1200,\"height\":627,\"caption\":\"Firewalls\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Everything you need to know about firewalls\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\",\"name\":\"Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"caption\":\"Franklin\"},\"url\":\"https:\/\/cybersmart.com\/author\/franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Everything you need to know about firewalls - CyberSmart","description":"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/","og_locale":"en_US","og_type":"article","og_title":"Everything you need to know about firewalls - CyberSmart","og_description":"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know","og_url":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2021-03-31T13:57:17+00:00","article_modified_time":"2021-10-06T12:05:07+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg","type":"image\/jpeg"}],"author":"Franklin","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Franklin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/"},"author":{"name":"Franklin","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13"},"headline":"Everything you need to know about firewalls","datePublished":"2021-03-31T13:57:17+00:00","dateModified":"2021-10-06T12:05:07+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/"},"wordCount":999,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg","keywords":["cyber attack","Cyber Essentials","cyber threats","cybersecurity","firewall","SMEs"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/","url":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/","name":"Everything you need to know about firewalls - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg","datePublished":"2021-03-31T13:57:17+00:00","dateModified":"2021-10-06T12:05:07+00:00","description":"Firewalls can appear confusing, but in reality, it's a simple tool that does a very important job. Here's everything you need to know","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/03\/Social_Images-19.jpg","width":1200,"height":627,"caption":"Firewalls"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/everything-you-need-to-know-about-firewalls\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Everything you need to know about firewalls"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13","name":"Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","caption":"Franklin"},"url":"https:\/\/cybersmart.com\/author\/franklin\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6956"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=6956"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6956\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6957"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=6956"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=6956"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=6956"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}