{"id":9389,"date":"2016-02-24T11:09:15","date_gmt":"2016-02-24T16:09:15","guid":{"rendered":"http:\/\/www.hostdime.com\/blog\/?p=9389"},"modified":"2016-02-24T13:39:12","modified_gmt":"2016-02-24T18:39:12","slug":"server-room-security-colocation","status":"publish","type":"post","link":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/","title":{"rendered":"A Brief History of Server Room Heists"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\" alt=\"data center heists\" width=\"500\" height=\"364\" class=\"aligncenter size-full wp-image-9396\" srcset=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png 500w, https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist-300x218.png 300w\" sizes=\"auto, (max-width: 500px) 100vw, 500px\" \/><\/p>\n<p>Hundreds of thousands of businesses around the world use a server room in their office for their online operation. A server room is often a little bigger than a closet filled with computer servers and IT gear.<\/p>\n<p>One main server room limitation is the security of yours and your customers&#8217; data. At the very least, the server room must be behind lock-and-key with limited people allowed access to it. Better yet, the entrance should be secured with two alarms, one for unauthorized entry and another in the case of a leak. Ideally the room would feature an IP Camera which would allow administrators to see who enters and leaves remotely.<\/p>\n<p>After a bit of research, there appears to only been 5 major data center heists in the last 10 years. To put that in perspective, commercial banks in the United States were robbed <a href=\"https:\/\/www.fbi.gov\/stats-services\/publications\/bank-crime-statistics-2014\/bank-crime-statistics-2014\" target=\"_blank\">over 3400 times<\/a> in 2014 alone. <\/p>\n<p>You can read up on the 5 NOC burglaries here: <a href=\"http:\/\/www.theregister.co.uk\/2006\/11\/01\/level3_robbery\/\">Level 3 (UK)<\/a> and <a href=\"http:\/\/www.theregister.co.uk\/2006\/10\/20\/easynet_brick_lane_robbery\/\">Easynet (UK)<\/a> in 2006, <a href=\"http:\/\/www.datacenterknowledge.com\/archives\/2007\/12\/08\/oceans-11-data-center-robbery-in-london\/\">Verizon (UK)<\/a> and <a href=\"http:\/\/www.datacenterknowledge.com\/archives\/2007\/11\/04\/armed-robbery-at-chicago-data-center\/\">CI Host (US)<\/a> in 2007, and <a href=\"http:\/\/www.datacenterknowledge.com\/archives\/2011\/02\/28\/data-center-theft-kos-vodafone-network\/\">Vodafone (UK)<\/a> in 2011. Obviously, server rooms at businesses get robbed at a much higher frequency, which is a major reason for off-site colocation. Here&#8217;s a few of the major recent burglaries that involved physical theft over virtual hacking:<\/p>\n<p><strong>2006<\/strong>: A burglar broke into a Midwest office of <strong><a href=\"http:\/\/www.nbcnews.com\/id\/13327187\/ns\/technology_and_science-security\/t\/stolen-computer-server-sparks-id-theft-fears\/#.VsYnFMCANBc\">American Insurance Group (AIG)<\/a><\/strong> and took with him a computer server containing the social security numbers and some medical records of close to a million Americans. The thief came in through the ceiling of the server room. A pro tip when picking a server room is avoid a room with more than one entrance, and certainly make sure there are no windows. <\/p>\n<p><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/MISSION_1_NocList-e1456261468110.jpg\" alt=\"MISSION_1_NocList\" width=\"575\" height=\"305\" class=\"aligncenter size-full wp-image-9421\" \/><\/p>\n<p><strong>2007<\/strong>: A computer file server containing very personal medical information on 3,000 cancer research subjects was stolen from a locked <strong><a href=\"http:\/\/www.bizjournals.com\/sanfrancisco\/stories\/2007\/04\/16\/daily40.html?page=all\">University of California San Francisco<\/a><\/strong> office. <\/p>\n<p><strong>2008<\/strong>: <strong><a href=\"http:\/\/www.21alive.com\/news\/local\/17967284.html\">Indiana&#8217;s Central Collection Bureau<\/a><\/strong> had offices burglarized by thieves who made away with a data base server that included social security numbers on 700,000 Indiana residents and customer-billing records for about 100 Indiana businesses. The server was NOT encrypted. <\/p>\n<p><strong>2008<\/strong>: Many Google and CNET employees had their addresses and social security numbers exposed when <strong><a href=\"http:\/\/www.pcworld.com\/article\/147460\/article.html\">Colt Express Outsourcing Services<\/a><\/strong> had their office burglarized. Colt Express&#8217; offices didn&#8217;t have an alarm system at the time and soon went out of business.<\/p>\n<p><strong>2010<\/strong>: Two burglars broke an outside widow to <strong><a href=\"http:\/\/www.databreaches.net\/stolen-server-contains-medical-info-on-40000-eye-patients\/\">Silicon Valley Eyecare Optometry and Contact Lenses<\/a><\/strong>&#8216; office and stole a data base server containing information on 40,000 patients including their addresses, phone numbers, social security numbers, e-mail addresses, birthdates, family members, medical insurances, and health information.<\/p>\n<p><strong>2013<\/strong>: Wal-Mart&#8217;s streaming media provider <strong><a href=\"http:\/\/www.pcmag.com\/article2\/0,2817,2417604,00.asp\">Vudu<\/a><\/strong> admitted their physical office security was lacking after a break-in at their office, where thieves stole hard drives comprising all users&#8217; emails, addresses, account activity, dates of birth, and credit card information.<\/p>\n<p><strong>2015<\/strong>: A thief forced his way into the server room of children\u2019s charity <strong><a href=\"http:\/\/www.thirdsector.co.uk\/plan-uk-alerts-supporters-theft-computer-servers-its-offices\/management\/article\/1375208\">Plan UK<\/a><\/strong>, taking five servers containing information on 90,000 supporters, including names, addresses, contact details, bank account numbers.<\/p>\n<p>What can you do to counteract this? The bottom line is to trust a secure data center for your business operation as the likelihood that your office is more locked down than an enterprise NOC is low. Most offices are low-hanging fruit for robbers. <\/p>\n<p><a href=\"https:\/\/www.hostdime.com\/facilities\/data-center\/\">HostDime&#8217;s data centers<\/a> features multi-layered approach to security, usually including secure fingerprint check-ins, man-trap doors, 24\/7 cameras, and around-the-clock personnel.<\/p>\n<p><iframe loading=\"lazy\" width=\"560\" height=\"315\" src=\"https:\/\/www.youtube.com\/embed\/K8UVWZGjDFw\" frameborder=\"0\" allowfullscreen><\/iframe><\/p>\n<p>If you insist on having your servers at your own business location, make sure you are performing periodical backups. We offer a ton of <a href=\"https:\/\/www.hostdime.com\/resources\/?s=backups\">backup tips and tricks<\/a> to help you. <\/p>\n<p>[divider]<\/p>\n<p>HostDime.com, Inc is a global data center infrastructure provider with data centers all around the world<\/a>. Features such as biometric access points at all entrances ensure that access is granted only to those approved by the HostDime security team. Dozens of continuously monitored security cameras provide a watchful eye to make sure all hardware is secure.<\/p>\n<p>Jared Smith is HostDime&#8217;s Content Strategist.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Server rooms at businesses get robbed at a much higher frequency than data centers, which is a major reason for off-site colocation. Here&#8217;s a few of the major recent burglaries that involved physical theft over virtual hacking.<\/p>\n","protected":false},"author":13,"featured_media":9396,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[12,8],"tags":[],"class_list":["post-9389","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-dedicated-servers","category-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>A Brief History of Server Room Heists<\/title>\n<meta name=\"description\" content=\"Server rooms at businesses are low-hanging fruit for robbers. Here&#039;s a few of the major recent burglaries that involved physical theft over virtual hacking.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"A Brief History of Server Room Heists\" \/>\n<meta property=\"og:description\" content=\"Server rooms at businesses are low-hanging fruit for robbers. Here&#039;s a few of the major recent burglaries that involved physical theft over virtual hacking.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\" \/>\n<meta property=\"og:site_name\" content=\"HostDime Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/hostdime\" \/>\n<meta property=\"article:published_time\" content=\"2016-02-24T16:09:15+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-02-24T18:39:12+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\" \/>\n\t<meta property=\"og:image:width\" content=\"500\" \/>\n\t<meta property=\"og:image:height\" content=\"364\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jared Smith\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jared Smith\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\"},\"author\":{\"name\":\"Jared Smith\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503\"},\"headline\":\"A Brief History of Server Room Heists\",\"datePublished\":\"2016-02-24T16:09:15+00:00\",\"dateModified\":\"2016-02-24T18:39:12+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\"},\"wordCount\":657,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\",\"articleSection\":[\"Dedicated Servers\",\"Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\",\"url\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\",\"name\":\"A Brief History of Server Room Heists\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\",\"datePublished\":\"2016-02-24T16:09:15+00:00\",\"dateModified\":\"2016-02-24T18:39:12+00:00\",\"description\":\"Server rooms at businesses are low-hanging fruit for robbers. Here's a few of the major recent burglaries that involved physical theft over virtual hacking.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage\",\"url\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\",\"contentUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png\",\"width\":500,\"height\":364,\"caption\":\"data center heists\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostdime.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"A Brief History of Server Room Heists\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#website\",\"url\":\"https:\/\/www.hostdime.com\/blog\/\",\"name\":\"HostDime Data Center Blog\",\"description\":\"Hyper Edge, Purpose-Built Data Centers\",\"publisher\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostdime.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#organization\",\"name\":\"HostDime\",\"url\":\"https:\/\/www.hostdime.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png\",\"contentUrl\":\"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png\",\"width\":150,\"height\":150,\"caption\":\"HostDime\"},\"image\":{\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/hostdime\",\"https:\/\/x.com\/hostdime\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503\",\"name\":\"Jared Smith\",\"description\":\"Jared Smith is HostDime's Director of Marketing and the author of the HostDime Blog. Email Jared for guest blogging opportunities on your website or this one.\",\"sameAs\":[\"http:\/\/hostdime.com\/blog\"],\"url\":\"https:\/\/www.hostdime.com\/blog\/author\/jared-s\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"A Brief History of Server Room Heists","description":"Server rooms at businesses are low-hanging fruit for robbers. Here's a few of the major recent burglaries that involved physical theft over virtual hacking.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/","og_locale":"en_US","og_type":"article","og_title":"A Brief History of Server Room Heists","og_description":"Server rooms at businesses are low-hanging fruit for robbers. Here's a few of the major recent burglaries that involved physical theft over virtual hacking.","og_url":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/","og_site_name":"HostDime Blog","article_publisher":"https:\/\/www.facebook.com\/hostdime","article_published_time":"2016-02-24T16:09:15+00:00","article_modified_time":"2016-02-24T18:39:12+00:00","og_image":[{"width":500,"height":364,"url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png","type":"image\/png"}],"author":"Jared Smith","twitter_misc":{"Written by":"Jared Smith","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#article","isPartOf":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/"},"author":{"name":"Jared Smith","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503"},"headline":"A Brief History of Server Room Heists","datePublished":"2016-02-24T16:09:15+00:00","dateModified":"2016-02-24T18:39:12+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/"},"wordCount":657,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostdime.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png","articleSection":["Dedicated Servers","Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/","url":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/","name":"A Brief History of Server Room Heists","isPartOf":{"@id":"https:\/\/www.hostdime.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png","datePublished":"2016-02-24T16:09:15+00:00","dateModified":"2016-02-24T18:39:12+00:00","description":"Server rooms at businesses are low-hanging fruit for robbers. Here's a few of the major recent burglaries that involved physical theft over virtual hacking.","breadcrumb":{"@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#primaryimage","url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png","contentUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2016\/02\/Heist.png","width":500,"height":364,"caption":"data center heists"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostdime.com\/blog\/server-room-security-colocation\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostdime.com\/blog\/"},{"@type":"ListItem","position":2,"name":"A Brief History of Server Room Heists"}]},{"@type":"WebSite","@id":"https:\/\/www.hostdime.com\/blog\/#website","url":"https:\/\/www.hostdime.com\/blog\/","name":"HostDime Data Center Blog","description":"Hyper Edge, Purpose-Built Data Centers","publisher":{"@id":"https:\/\/www.hostdime.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostdime.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostdime.com\/blog\/#organization","name":"HostDime","url":"https:\/\/www.hostdime.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png","contentUrl":"https:\/\/www.hostdime.com\/blog\/wp-content\/uploads\/2019\/04\/pldooampldeadoii.png","width":150,"height":150,"caption":"HostDime"},"image":{"@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/hostdime","https:\/\/x.com\/hostdime"]},{"@type":"Person","@id":"https:\/\/www.hostdime.com\/blog\/#\/schema\/person\/fdc19f9386316cd19f8eebb64a223503","name":"Jared Smith","description":"Jared Smith is HostDime's Director of Marketing and the author of the HostDime Blog. Email Jared for guest blogging opportunities on your website or this one.","sameAs":["http:\/\/hostdime.com\/blog"],"url":"https:\/\/www.hostdime.com\/blog\/author\/jared-s\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/9389","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/comments?post=9389"}],"version-history":[{"count":38,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/9389\/revisions"}],"predecessor-version":[{"id":9430,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/posts\/9389\/revisions\/9430"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/media\/9396"}],"wp:attachment":[{"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/media?parent=9389"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/categories?post=9389"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostdime.com\/blog\/wp-json\/wp\/v2\/tags?post=9389"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}