{"id":42696,"date":"2019-10-27T09:00:10","date_gmt":"2019-10-27T15:00:10","guid":{"rendered":"https:\/\/jumpcloud.com\/?p=42696"},"modified":"2022-03-30T09:53:42","modified_gmt":"2022-03-30T13:53:42","slug":"credential-theft-mitigation","status":"publish","type":"post","link":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation","title":{"rendered":"Credential Theft: How It Works and How to Mitigate It"},"content":{"rendered":"\n

In the spirit of National Cybersecurity Awareness Month, we\u2019re running a three-part series on how to shore up identity security and help prevent a data breach. In our first post below, we\u2019ll take a look at how credential theft really works and how to combat it. Stay tuned for guidelines on controlling broad permissions<\/strong>, plus how to increase security with cloud-based software-as-a-service (SaaS)<\/a>, infrastructure-as-a-service (IaaS), and platform-as-a-service (PaaS) solutions whenever possible.<\/span><\/i><\/p>\n\n\n\n

Although cyberattacks have evolved in their targeting methods and external appearances, they often exploit a familiar set of organizational vulnerabilities. The National Institute of Standards and Technology (NIST) confirms that many data breaches and other cybersecurity failures trace back to a \u201crelatively small number of root causes.\u201d<\/span>1<\/sup><\/span> Given the relatively predictable patterns in these attacks, cybersecurity professionals often find themselves surprised when yet another garden-variety threat makes news by succeeding with a massive data breach. In these scenarios, hindsight tends to reveal that the attack could\u2019ve been prevented if the affected organization(s) had more carefully followed standard security hygiene practices like patching operating systems and apps or protecting identities by adding multi-factor authentication (MFA).<\/span><\/p>\n\n\n\n

Beyond timely installation of security patches, <\/span>identity security best practices<\/span><\/a> constitute another common missed opportunity and represent one of the most important steps toward preventing a compromise. Cyberattacks that have the power to breach data centers and destroy assets sometimes use stolen credentials to access and traverse a secure environment, so it\u2019s crucial to reinforce authentication systems wherever possible. With a better understanding of how credential theft works, we can determine which precautions will be most effective at mitigating it. <\/span><\/p>\n\n\n\n

Common Credential Theft Techniques <\/span><\/h2>\n\n\n\n

It\u2019s a common misconception that enforcing password length and complexity requirements will do enough to keep credentials secure. A closer look at how credential theft works in practice, though, helps to underscore how password length and complexity alone are often insufficient protection against an attack. In fact, almost all effective methods of credential theft (other than password spray and brute force cracking) involve stealing the user\u2019s exact password rather than randomly guessing it. Modern ransomware often scrapes passwords from data sets it has captured, and research has found 12 million corporate credentials are for sale on at least 20 dark web marketplaces.<\/span>2<\/sup><\/span><\/p>\n\n\n\n

Methods for stealing and utilizing credentials can be more complex than the easily spotted phishing scams of yesteryear. Modern \u201cspear\u201d phishing attacks sometimes deploy enough personal information and context to make even a wary user think a request for credentials is legitimate. Along with phishing and list cleaning via ransomware, keystroke logging, in which malware virtually watches a user type in their password, is another method of credential theft that works regardless of password complexity.<\/span>3<\/sup><\/span>  <\/span><\/p>\n\n\n\n

An organization\u2019s resources can be compromised by credential theft even if those resources haven\u2019t been directly targeted and harvested. This can happen if a user shares a password (or slightly different versions of the same password) across a variety of accounts. Their credentials might be well-protected at work, but they could be stolen from a less-secure personal account and used in an attack later. <\/span><\/p>\n\n\n\n

To a degree, password complexity does help to combat brute force attacks, the credential theft technique in which a series of possible passwords are tested on a list of known usernames. But because modern authentication systems lock after more than a few incorrect login attempts, attackers can only try a handful of password guesses for each account. They succeed when they stumble upon an account whose extremely simple and popular password matches their lucky guess. With this in mind, we can say that increasing password complexity beyond a bare-minimum baseline offers diminishing returns. <\/span><\/p>\n\n\n\n

Combatting Credential Theft  <\/span><\/h2>\n\n\n\n

Advanced email and browser protections can go a long way toward preventing credential theft and minimizing the value of stolen credentials to attackers. A single sign-on (SSO) solution, for example, means users only have to keep track of one set of credentials that grant them access to email and web apps. Combined with education about the dangers of password sharing, SSO helps reduce the likelihood that end users will compromise password security for the sake of convenience. <\/span><\/p>\n\n\n\n

Multi-factor authentication (MFA), in turn, helps to render stolen credentials useless. Because MFA requires a user to enter a second form of identification for access, often a temporary code sent securely to a separate device like the user\u2019s smartphone, a stolen password on its own isn\u2019t enough to breach an account. <\/span>Enabling MFA in every possible instance may be the single most effective action IT departments can take to combat credential theft.<\/b> <\/span><\/p>\n\n\n\n

Beyond email and browser precautions, IT admins should also check on existing network controls. On-prem WiFi access should be secured with an up-to-date <\/span>RADIUS server<\/span><\/a>, and each user should access the internet with individual credentials rather than a communally shared password. The same password standards apply for on-site file storage and other LAN resources. <\/span><\/p>\n\n\n\n

Streamlined Identity Security <\/span><\/h2>\n\n\n\n

Combining the above measures into one streamlined identity solution could save your IT team a significant amount of time and manual labor, not to mention the smiles of relief you\u2019ll see on employees\u2019 faces when the next big wave of cyberattacks skips your organization on its way to the news cycle. Learn more about <\/span>how JumpCloud can automate MFA deployment<\/span><\/a> and help fight credential theft.   <\/span><\/p>\n\n\n\n

Sources<\/span><\/p>\n\n\n\n

  1. \u201cCritical Cybersecurity Hygiene: Patching the Enterprise.\u201d National Institute of Standards and Technology. Accessed Oct. 18, 2019. <\/span>https:\/\/www.nccoe.nist.gov\/projects\/building-blocks\/patching-enterprise<\/span><\/a>. <\/span><\/li>
  2. Simos, Mark and Jim Moeller. \u201cMitigating Rapid Cyberattacks (Petya, WannaCrypt, and Similar).\u201d Microsoft. PowerPoint Slide Deck. Accessed Oct. 18, 2019. <\/span>https:\/\/aka.ms\/rapidattack-slides<\/a>. <\/span><\/li>
  3. Weinert, Alex. \u201cYour Pa$$word Doesn\u2019t Matter.\u201d Microsoft Tech Community. Aug. 9, 2019. <\/span>https:\/\/techcommunity.microsoft.com\/t5\/Azure-Active-Directory-Identity\/Your-Pa-word-doesn-t-matter\/ba-p\/731984<\/span><\/a>.     <\/span><\/li><\/ol>\n","protected":false},"excerpt":{"rendered":"

    In the spirit of National Cybersecurity Awareness Month, we\u2019re running a three-part series on how to shore up identity security […]<\/p>\n","protected":false},"author":91,"featured_media":42697,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_oasis_is_in_workflow":0,"_oasis_original":0,"_oasis_task_priority":"","inline_featured_image":false,"footnotes":""},"categories":[23,2781],"tags":[],"collection":[2775],"platform":[],"funnel_stage":[3016],"coauthors":[2529],"acf":[],"yoast_head":"\nCredential Theft: How It Works and How to Mitigate It - JumpCloud<\/title>\n<meta name=\"description\" content=\"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Credential Theft: How It Works and How to Mitigate It\" \/>\n<meta property=\"og:description\" content=\"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\" \/>\n<meta property=\"og:site_name\" content=\"JumpCloud\" \/>\n<meta property=\"article:published_time\" content=\"2019-10-27T15:00:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-03-30T13:53:42+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"780\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Mike Ranellone\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Mike Ranellone\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#article\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\"},\"author\":{\"name\":\"Mike Ranellone\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1\"},\"headline\":\"Credential Theft: How It Works and How to Mitigate It\",\"datePublished\":\"2019-10-27T15:00:10+00:00\",\"dateModified\":\"2022-03-30T13:53:42+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\"},\"wordCount\":984,\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg\",\"articleSection\":[\"Best Practices\",\"How-To\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\",\"url\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\",\"name\":\"Credential Theft: How It Works and How to Mitigate It - JumpCloud\",\"isPartOf\":{\"@id\":\"https:\/\/jumpcloud.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage\"},\"thumbnailUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg\",\"datePublished\":\"2019-10-27T15:00:10+00:00\",\"dateModified\":\"2022-03-30T13:53:42+00:00\",\"description\":\"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.\",\"breadcrumb\":{\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg\",\"width\":780,\"height\":520,\"caption\":\"Credential Theft Mitigation - Locked Door\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/jumpcloud.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Credential Theft: How It Works and How to Mitigate It\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/jumpcloud.com\/#website\",\"url\":\"https:\/\/jumpcloud.com\/\",\"name\":\"JumpCloud\",\"description\":\"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.\",\"publisher\":{\"@id\":\"https:\/\/jumpcloud.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/jumpcloud.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/jumpcloud.com\/#organization\",\"name\":\"JumpCloud\",\"url\":\"https:\/\/jumpcloud.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"contentUrl\":\"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png\",\"width\":598,\"height\":101,\"caption\":\"JumpCloud\"},\"image\":{\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1\",\"name\":\"Mike Ranellone\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/c369c2a0c9f206bb9873a0446a15bcf5\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g\",\"caption\":\"Mike Ranellone\"},\"description\":\"Mike is a writer at JumpCloud who's especially interested in the changing role of tech in society. He cut his teeth in the ad agency world and holds an M.F.A. in creative writing from the University of Colorado-Boulder and a B.A. in English and music from St. Lawrence University in Canton, NY. Outside of JumpCloud, he's an avid skier, cellist, and poet.\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Credential Theft: How It Works and How to Mitigate It - JumpCloud","description":"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation","og_locale":"en_US","og_type":"article","og_title":"Credential Theft: How It Works and How to Mitigate It","og_description":"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.","og_url":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation","og_site_name":"JumpCloud","article_published_time":"2019-10-27T15:00:10+00:00","article_modified_time":"2022-03-30T13:53:42+00:00","og_image":[{"width":780,"height":520,"url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg","type":"image\/jpeg"}],"author":"Mike Ranellone","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Mike Ranellone","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#article","isPartOf":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation"},"author":{"name":"Mike Ranellone","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1"},"headline":"Credential Theft: How It Works and How to Mitigate It","datePublished":"2019-10-27T15:00:10+00:00","dateModified":"2022-03-30T13:53:42+00:00","mainEntityOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation"},"wordCount":984,"publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg","articleSection":["Best Practices","How-To"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation","url":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation","name":"Credential Theft: How It Works and How to Mitigate It - JumpCloud","isPartOf":{"@id":"https:\/\/jumpcloud.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage"},"image":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage"},"thumbnailUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg","datePublished":"2019-10-27T15:00:10+00:00","dateModified":"2022-03-30T13:53:42+00:00","description":"Mitigating credential theft involves more than password length and complexity. Help prevent a data breach with these quick fixes.","breadcrumb":{"@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#primaryimage","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2019\/10\/credential-theft-mitigation.jpg","width":780,"height":520,"caption":"Credential Theft Mitigation - Locked Door"},{"@type":"BreadcrumbList","@id":"https:\/\/jumpcloud.com\/blog\/credential-theft-mitigation#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jumpcloud.com\/"},{"@type":"ListItem","position":2,"name":"Credential Theft: How It Works and How to Mitigate It"}]},{"@type":"WebSite","@id":"https:\/\/jumpcloud.com\/#website","url":"https:\/\/jumpcloud.com\/","name":"JumpCloud","description":"Daily insights on directory services, IAM, LDAP, identity security, SSO, system management (Mac, Windows, Linux), networking, and the cloud.","publisher":{"@id":"https:\/\/jumpcloud.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jumpcloud.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/jumpcloud.com\/#organization","name":"JumpCloud","url":"https:\/\/jumpcloud.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/","url":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","contentUrl":"https:\/\/jumpcloud.com\/wp-content\/uploads\/2021\/01\/jc-logo-brand-2021.png","width":598,"height":101,"caption":"JumpCloud"},"image":{"@id":"https:\/\/jumpcloud.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/24d4cb0cb7a9c71b168baee4234925c1","name":"Mike Ranellone","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/jumpcloud.com\/#\/schema\/person\/image\/c369c2a0c9f206bb9873a0446a15bcf5","url":"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3db264ca258363eb5ba4360ddf0bed4c?s=96&d=mm&r=g","caption":"Mike Ranellone"},"description":"Mike is a writer at JumpCloud who's especially interested in the changing role of tech in society. He cut his teeth in the ad agency world and holds an M.F.A. in creative writing from the University of Colorado-Boulder and a B.A. in English and music from St. Lawrence University in Canton, NY. Outside of JumpCloud, he's an avid skier, cellist, and poet."}]}},"_links":{"self":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/42696"}],"collection":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/users\/91"}],"replies":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/comments?post=42696"}],"version-history":[{"count":3,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/42696\/revisions"}],"predecessor-version":[{"id":61357,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/posts\/42696\/revisions\/61357"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media\/42697"}],"wp:attachment":[{"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/media?parent=42696"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/categories?post=42696"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/tags?post=42696"},{"taxonomy":"collection","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/collection?post=42696"},{"taxonomy":"platform","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/platform?post=42696"},{"taxonomy":"funnel_stage","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/funnel_stage?post=42696"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/jumpcloud.com\/wp-json\/wp\/v2\/coauthors?post=42696"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}