{"id":754,"date":"2023-08-14T11:41:41","date_gmt":"2023-08-14T11:41:41","guid":{"rendered":"https:\/\/atb.tech\/blog\/?p=754"},"modified":"2023-08-14T11:41:41","modified_gmt":"2023-08-14T11:41:41","slug":"multi-factor-authentication","status":"publish","type":"post","link":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/","title":{"rendered":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">A basic username and password simply won\u2019t cut it anymore. This article provides you with everything you need to know about multi-factor authentication and why it&#8217;s crucial for you.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Keeping our information safe poses an ongoing challenge. Cyber threats are advancing, and attacks are occurring more frequently. According to cybersecurity ops company, Rapid7, their <\/span><a href=\"https:\/\/www.rapid7.com\/research\/under-the-hoodie\/\"><span style=\"font-weight: 400;\">2020 penetration testing report<\/span><\/a><span style=\"font-weight: 400;\"> revealed that a high number of businesses (67% of those tested) did not utilize multifactor authentication for any of their login points.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the simplest yet most effective ways to prevent security breaches and maintain information security is to employ <\/span><a href=\"https:\/\/www.globalsign.com\/en\/blog\/what-is-multi-factor-authentication\"><span style=\"font-weight: 400;\">multi-factor authentication (MFA)<\/span><\/a><span style=\"font-weight: 400;\">, sometimes known as two-factor authentication (TFA). Unfortunately, static usernames and passwords are no longer as effective as they once were, as stolen or weak passwords accounted for 81% of hacking-related breaches.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Overview: What is multi-factor authentication (MFA)?<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">Multifactor authentication (MFA), also called two-factor authentication, is an additional security measure that adds on to your standard login procedures to verify the identity of specific users.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The effectiveness of MFA is centred around its multifactor nature. By requiring multiple forms of verification, MFA compels potential intruders to overcome not only one but several layers of defence. This dynamic interaction of factors transforms the authentication process into a complex puzzle, with each factor acting as a unique piece contributing to the complete picture of your identity.<\/span><\/p>\n<h3 style=\"text-align: center;\"><b>Factors Involved in MFA<\/b><\/h3>\n<h5><b>Something You Know<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">This factor, the most familiar one, involves information known only to the user. Historically, this has been a password or a PIN (Personal Identification Number). It serves as the first line of defence and requires users to input a code or secret phrase memorized by them.<\/span><\/p>\n<h5><b>Something You Have<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">Going beyond knowledge, this factor introduces a tangible element. It often takes the form of a physical token, like a smartphone, security card, or USB key. This factor is closely tied to the possession of an item that only a legitimate user should have access to.<\/span><\/p>\n<h5><b>Something You Are<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">This factor delves into biometrics, utilizing unique physical attributes or behavioural patterns exclusive to an individual. Fingerprint recognition, retina scans, facial recognition, and even voice recognition fall into this category. These traits are highly challenging to replicate, making them a powerful component of MFA.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: left;\"><b>Types of Authentication Methods<\/b><\/h3>\n<ul>\n<li><b>One-Time Password (OTP) Tokens: <\/b><span style=\"font-weight: 400;\">Traditionally, users carried physical OTP tokens. These tokens displayed a random number on a small screen, generated by the device, for authentication.<\/span><\/li>\n<li><b>SMS Authentication: <\/b><span style=\"font-weight: 400;\">This method relies on a user&#8217;s mobile device. After logging in with their username and password, a text message containing a code is sent to their mobile phone for verification.<\/span><\/li>\n<li><b>Out-of-Band Authentication: <\/b><span style=\"font-weight: 400;\">In this case, a user&#8217;s proximity to their registered phone is crucial. They receive a call on their mobile or landline and are required to dial a specific number or repeat a predefined phrase to validate.<\/span><\/li>\n<li><b>Biometric Authentication: <\/b><span style=\"font-weight: 400;\">This involves unique physical traits such as fingerprints, facial features, eyes, or even handwritten signatures for verification. This falls under the &#8220;Something you Are&#8221; category and acts as the authentication key.<\/span><\/li>\n<li><b>Smart Card or USB Tokens: <\/b><span style=\"font-weight: 400;\">These devices combine multiple authentication factors. They require possession of the card\/token, a password to unlock it (which can also be for the user), and sometimes biometric verification.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">These methods cater to different needs, adding layers of protection and ensuring our online presence remains secure.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3 style=\"text-align: center;\"><b>4 Advantages of Multi-Factor Authentication (MFA)<\/b><\/h3>\n<p>&nbsp;<\/p>\n<p><span style=\"font-weight: 400;\">Multi-Factor Authentication (MFA) emerges as a beacon of security, offering a multi-layered defence against the increasingly sophisticated tactics of cyber adversaries. Let&#8217;s delve into the four distinct advantages that MFA brings to the table.<\/span><\/p>\n<h5><b>Robust Defense Against Unauthorized Access<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The primary advantage of MFA lies in its ability to strengthen the fortress of your digital identity. Unlike single-factor authentication, which relies solely on a password, MFA requires two or more forms of verification. This layered approach challenges potential intruders to breach multiple barriers, significantly reducing the likelihood of successful unauthorized access. Even if one factor is compromised \u2013 for example, your password \u2013 the intruder would still need to overcome the remaining factors to breach your account or system.<\/span><\/p>\n<h5><b>Mitigation of Password Vulnerabilities<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">The digital landscape abounds with tales of passwords falling prey to cyberattacks. Phishing, social engineering, and brute force attacks all exploit the inherent weaknesses of passwords. MFA presents a potent solution to this long-standing issue. By introducing factors beyond mere knowledge \u2013 such as something you have (a smartphone) or something you are (a fingerprint) \u2013 MFA diminishes the effectiveness of stolen passwords. This proactive approach significantly curtails the success of password-centric attacks.<\/span><\/p>\n<h5><b>Enhanced User Experience and Convenience<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">While prioritizing security, Multi-Factor Authentication does not compromise user experience. MFA has evolved to strike a delicate balance between safeguarding and convenience. Methods like push notifications, where authentication requests are sent to your trusted devices, and time-based one-time passwords (TOTP), generated by specialized apps, ensure that the verification process remains user-friendly. These streamlined processes seamlessly integrate MFA into your digital routine, minimizing unnecessary friction.<\/span><\/p>\n<h5><b>Adaptability to Emerging Technologies<\/b><\/h5>\n<p><span style=\"font-weight: 400;\">As technology evolves, so do the strategies of cybercriminals. Multi-Factor Authentication&#8217;s beauty lies in its flexibility to adapt to the evolving landscape of digital threats. With the rise of biometric technologies, MFA readily incorporates them. Facial recognition, fingerprint scanners, and retinal scans can be seamlessly integrated into the verification process, bolstering security while embracing cutting-edge innovations. MFA&#8217;s adaptability guarantees that your defences remain robust even when confronted with new challenges.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h3><b>Conclusion<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The brilliance of MFA lies in its synergy. The incorporation of these diverse factors ensures that a breach in one layer does not necessarily compromise the entire authentication process. Even if an attacker manages to obtain your password (something you know), they would still need access to your smartphone (something you have) or replicate your biometric traits (something you are) to gain unauthorized entry.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In the tireless pursuit of security, Multi-Factor Authentication stands as a beacon of innovation. By weaving together the threads of knowledge, possession, and identity, MFA constructs a multi-dimensional fortress that safeguards our digital lives against the ever-evolving array of cyber threats.<\/span><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A basic username and password simply won\u2019t cut it anymore. This article provides you with everything you need to know about multi-factor authentication and why it&#8217;s<span class=\"excerpt-hellip\"> [\u2026]<\/span><\/p>\n","protected":false},"author":3,"featured_media":755,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30],"tags":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech<\/title>\n<meta name=\"description\" content=\"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech\" \/>\n<meta property=\"og:description\" content=\"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\" \/>\n<meta property=\"og:site_name\" content=\"ATB Tech\" \/>\n<meta property=\"article:published_time\" content=\"2023-08-14T11:41:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2000\" \/>\n\t<meta property=\"og:image:height\" content=\"2000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Benjamin Adekunle\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Benjamin Adekunle\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\"},\"author\":{\"name\":\"Benjamin Adekunle\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/b2766ba56c92d0aca714fdcf4721633e\"},\"headline\":\"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023\",\"datePublished\":\"2023-08-14T11:41:41+00:00\",\"dateModified\":\"2023-08-14T11:41:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\"},\"wordCount\":1025,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/atb.tech\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg\",\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\",\"url\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\",\"name\":\"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech\",\"isPartOf\":{\"@id\":\"https:\/\/atb.tech\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg\",\"datePublished\":\"2023-08-14T11:41:41+00:00\",\"dateModified\":\"2023-08-14T11:41:41+00:00\",\"description\":\"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.\",\"breadcrumb\":{\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage\",\"url\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg\",\"contentUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg\",\"width\":2000,\"height\":2000,\"caption\":\"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/atb.tech\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/atb.tech\/blog\/#website\",\"url\":\"https:\/\/atb.tech\/blog\/\",\"name\":\"ATB Tech\",\"description\":\"Welcome To ATB Tech&#039;s Blog\",\"publisher\":{\"@id\":\"https:\/\/atb.tech\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/atb.tech\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/atb.tech\/blog\/#organization\",\"name\":\"ATB Tech\",\"url\":\"https:\/\/atb.tech\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png\",\"contentUrl\":\"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png\",\"width\":1459,\"height\":259,\"caption\":\"ATB Tech\"},\"image\":{\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/b2766ba56c92d0aca714fdcf4721633e\",\"name\":\"Benjamin Adekunle\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/atb.tech\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f9b1bfd02086fe6f168add51d5de812e?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f9b1bfd02086fe6f168add51d5de812e?s=96&d=mm&r=g\",\"caption\":\"Benjamin Adekunle\"},\"url\":\"https:\/\/atb.tech\/blog\/author\/ben\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech","description":"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/","og_locale":"en_US","og_type":"article","og_title":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech","og_description":"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.","og_url":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/","og_site_name":"ATB Tech","article_published_time":"2023-08-14T11:41:41+00:00","og_image":[{"width":2000,"height":2000,"url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg","type":"image\/jpeg"}],"author":"Benjamin Adekunle","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Benjamin Adekunle","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#article","isPartOf":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/"},"author":{"name":"Benjamin Adekunle","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/b2766ba56c92d0aca714fdcf4721633e"},"headline":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023","datePublished":"2023-08-14T11:41:41+00:00","dateModified":"2023-08-14T11:41:41+00:00","mainEntityOfPage":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/"},"wordCount":1025,"commentCount":0,"publisher":{"@id":"https:\/\/atb.tech\/blog\/#organization"},"image":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg","articleSection":["Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/atb.tech\/blog\/multi-factor-authentication\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/","url":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/","name":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023 - ATB Tech","isPartOf":{"@id":"https:\/\/atb.tech\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage"},"image":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage"},"thumbnailUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg","datePublished":"2023-08-14T11:41:41+00:00","dateModified":"2023-08-14T11:41:41+00:00","description":"Discover the factors involved in MFA and various authentication methods, along with its advantages in robust defence.","breadcrumb":{"@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/atb.tech\/blog\/multi-factor-authentication\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#primaryimage","url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg","contentUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2023\/08\/5191079.jpg","width":2000,"height":2000,"caption":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023"},{"@type":"BreadcrumbList","@id":"https:\/\/atb.tech\/blog\/multi-factor-authentication\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/atb.tech\/blog\/"},{"@type":"ListItem","position":2,"name":"Why Multi-Factor Authentication (MFA) is Crucial for Your Online Safety in 2023"}]},{"@type":"WebSite","@id":"https:\/\/atb.tech\/blog\/#website","url":"https:\/\/atb.tech\/blog\/","name":"ATB Tech","description":"Welcome To ATB Tech&#039;s Blog","publisher":{"@id":"https:\/\/atb.tech\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/atb.tech\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/atb.tech\/blog\/#organization","name":"ATB Tech","url":"https:\/\/atb.tech\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png","contentUrl":"https:\/\/atb.tech\/blog\/wp-content\/uploads\/2022\/05\/logo-1.png","width":1459,"height":259,"caption":"ATB Tech"},"image":{"@id":"https:\/\/atb.tech\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/b2766ba56c92d0aca714fdcf4721633e","name":"Benjamin Adekunle","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/atb.tech\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/f9b1bfd02086fe6f168add51d5de812e?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f9b1bfd02086fe6f168add51d5de812e?s=96&d=mm&r=g","caption":"Benjamin Adekunle"},"url":"https:\/\/atb.tech\/blog\/author\/ben\/"}]}},"_links":{"self":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/754"}],"collection":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/comments?post=754"}],"version-history":[{"count":1,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions"}],"predecessor-version":[{"id":756,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/posts\/754\/revisions\/756"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/media\/755"}],"wp:attachment":[{"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/media?parent=754"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/categories?post=754"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/atb.tech\/blog\/wp-json\/wp\/v2\/tags?post=754"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}