{"id":4541,"date":"2022-12-15T09:13:55","date_gmt":"2022-12-15T14:13:55","guid":{"rendered":"https:\/\/ionic.io\/blog\/?p=4541"},"modified":"2022-12-15T11:17:03","modified_gmt":"2022-12-15T16:17:03","slug":"get-proactive-about-data-security","status":"publish","type":"post","link":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security","title":{"rendered":"Get Proactive About Data Security"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">The average cost of a <\/span><a href=\"https:\/\/www.upguard.com\/blog\/cost-of-data-breach\"><span style=\"font-weight: 400;\">data breach in 2022<\/span><\/a><span style=\"font-weight: 400;\"> is $4.35 million. When remote work is a factor, that figure is almost $1 million more. With a pandemic forcing more people toward their mobile devices than ever, the opportunities for cyber attacks grew in parallel.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">More time on the phone meant more apps downloaded to a user\u2019s device. As a result, the surface area for attack grew exponentially. From misconfigured APIs to outdated versions of applications, there are numerous ways that bad actors can take advantage of app data.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Just because hackers have more opportunities than ever doesn\u2019t mean you need to panic. Though <\/span><a href=\"https:\/\/ionic.io\/blog\/the-top-most-common-attack-vectors-for-mobile-threats\"><span style=\"font-weight: 400;\">security blunders<\/span><\/a><span style=\"font-weight: 400;\"> are common and costly, they\u2019re almost always preventable with sound practices and proactive security measures.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">So what can you do to ensure your apps (and data) are safe?<\/span><\/p>\n<p><!--more--><\/p>\n<h2>Have the right tools<\/h2>\n<p><span style=\"font-weight: 400;\">Compromised credentials make up <\/span><a href=\"https:\/\/www.upguard.com\/blog\/cost-of-data-breach\"><span style=\"font-weight: 400;\">nearly 20% of data breaches<\/span><\/a><span style=\"font-weight: 400;\">. Vulnerabilities in integrated third-party software and cloud misconfiguration have also been identified as growing attack vectors. And while these are known attack vectors, it&#8217;s difficult for any team to stay on top of this if this isn&#8217;t their core area of expertise.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">That\u2019s why we built <\/span><a href=\"https:\/\/ionic.io\/products\/auth-connect\"><span style=\"font-weight: 400;\">Auth Connect<\/span><\/a><span style=\"font-weight: 400;\">, which makes it easy to integrate with popular auth providers and custom solutions, from Okta to Auth0 and more. From initial login to logout and token refresh, Auth Connect offers complete lifecycle protection. Meanwhile, <\/span><a href=\"https:\/\/ionic.io\/products\/identity-vault\"><span style=\"font-weight: 400;\">Identity Vault<\/span><\/a><span style=\"font-weight: 400;\"> allows you to add biometric authentication to new or existing Ionic apps. With <\/span><a href=\"https:\/\/www.techtarget.com\/searchmobilecomputing\/tip\/Preventing-attacks-on-mobile-applications-in-the-enterprise\"><span style=\"font-weight: 400;\">75% of phishing attacks targeting mobile<\/span><\/a><span style=\"font-weight: 400;\"> this past year, having multiple layers of security on your devices is crucial. <\/span><a href=\"https:\/\/ionic.io\/products\/secure-storage\"><span style=\"font-weight: 400;\">Secure Storage<\/span><\/a><span style=\"font-weight: 400;\"> is key to ensuring the security of your users\u2019 data, online and off. Secure Storage from Ionic is a powerful local database that makes it easy to encrypt, store, access, and manage data across all platforms, with top-tier security baked right in.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cIn building out our security trifecta (Auth Connect, Identity Vault, and Secure Storage) we did so with the changing needs of mobile users in mind. Designed using industry best practices and constantly changing to meet present day security demands, these plugins safeguard users and their data. We want our apps to be built with multiple layers of security across all access points, mitigating as much risk as possible.\u201d &#8211; Dallas James, Product Owner of Web Native technologies at Ionic<\/span><\/p>\n<h2>Have the right team, training, and support<\/h2>\n<p><span style=\"font-weight: 400;\">Ingraining security awareness into your company\u2019s culture can be one of the most powerful tools against potential attacks. Ensure you have people within the organization who are dedicated to keeping your devices secure, both online and offline.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Research suggests that human error is to blame for up to <\/span><a href=\"https:\/\/www.mimecast.com\/content\/what-is-security-awareness-training\/#:~:text=Security%20awareness%20training%20helps%20to,tailgaiting%20or%20improper%20document%20disposal.\"><span style=\"font-weight: 400;\">90% of cybersecurity attacks<\/span><\/a><span style=\"font-weight: 400;\"> and subsequent data breaches. While people can be your greatest vulnerability, they can also be your greatest asset when trained properly. Security awareness training is critical for ensuring that your team is up to date on security best practices. From knowing the signs to look for to knowing what not to do, regular security awareness training can drastically reduce risk in the workplace.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you aren\u2019t able to dedicate personnel exclusively to security, then leverage an external team\u2019s expertise. At Ionic, our Enterprise Support and Advisory Services have your back when it comes to ensuring the security of your applications.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u201cFrom reviewing code to consulting on best practices, we\u2019re committed to helping our customers release secure, up-to-date apps. We know how valuable consumer trust is, so we want enterprises to know that we\u2019re in their corner.\u201d &#8211; Tori Hansel, Associate Director, Customer Success<\/span><\/p>\n<h2>Be proactive<\/h2>\n<p><span style=\"font-weight: 400;\">Data breaches are expensive, and the best way to avoid a data breach is to be proactive. Take a look at your tools, team, training, and support structure and find out where you should get started.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">One of the quickest ways to get started is with Ionic\u2019s <\/span><a href=\"https:\/\/ionic.io\/enterprise-sdk\"><span style=\"font-weight: 400;\">Enterprise SDK<\/span><\/a><span style=\"font-weight: 400;\">. It\u2019s a one stop shop for arming your team with the tools they need to safeguard users and their data, get educated on mobile app best practices, and it comes with expert support through each phase of the development lifecycle.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">To learn more about Enterprise SDK, <\/span><a href=\"https:\/\/ionic.io\/contact\/sales\"><span style=\"font-weight: 400;\">get in touch with our App Strategists<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?<\/p>\n","protected":false},"author":100,"featured_media":4542,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"publish_to_discourse":"0","publish_post_category":"26","wpdc_auto_publish_overridden":"","wpdc_topic_tags":"","wpdc_pin_topic":"","wpdc_pin_until":"","discourse_post_id":"557178","discourse_permalink":"http:\/\/forum.ionicframework.com\/t\/get-proactive-about-data-security\/229597","wpdc_publishing_response":"","wpdc_publishing_error":"","_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1,123],"tags":[265],"class_list":["post-4541","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-all","category-perspectives","tag-ionic-enterprise-sdk"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.0 (Yoast SEO v23.0) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Get Proactive About Data Security - Ionic Blog<\/title>\n<meta name=\"description\" content=\"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Get Proactive About Data Security\" \/>\n<meta property=\"og:description\" content=\"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\" \/>\n<meta property=\"og:site_name\" content=\"Ionic Blog\" \/>\n<meta property=\"article:published_time\" content=\"2022-12-15T14:13:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-12-15T16:17:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png\" \/>\n\t<meta property=\"og:image:width\" content=\"2240\" \/>\n\t<meta property=\"og:image:height\" content=\"1120\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jacklin Altman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ionicframework\" \/>\n<meta name=\"twitter:site\" content=\"@ionicframework\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jacklin Altman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#article\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\"},\"author\":{\"name\":\"Jacklin Altman\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/6fbceef43a19a3a9c39b94e1db65abb6\"},\"headline\":\"Get Proactive About Data Security\",\"datePublished\":\"2022-12-15T14:13:55+00:00\",\"dateModified\":\"2022-12-15T16:17:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\"},\"wordCount\":704,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png\",\"keywords\":[\"Ionic Enterprise SDK\"],\"articleSection\":[\"All\",\"Perspectives\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\",\"url\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\",\"name\":\"Get Proactive About Data Security - Ionic Blog\",\"isPartOf\":{\"@id\":\"https:\/\/ionic.io\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage\"},\"thumbnailUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png\",\"datePublished\":\"2022-12-15T14:13:55+00:00\",\"dateModified\":\"2022-12-15T16:17:03+00:00\",\"description\":\"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?\",\"breadcrumb\":{\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png\",\"width\":2240,\"height\":1120},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/ionic.io\/blog\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Get Proactive About Data Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/ionic.io\/blog\/#website\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"name\":\"ionic.io\/blog\",\"description\":\"Build amazing native and progressive web apps with the web\",\"publisher\":{\"@id\":\"https:\/\/ionic.io\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/ionic.io\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/ionic.io\/blog\/#organization\",\"name\":\"Ionic\",\"url\":\"https:\/\/ionic.io\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png\",\"width\":1920,\"height\":854,\"caption\":\"Ionic\"},\"image\":{\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/x.com\/ionicframework\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/6fbceef43a19a3a9c39b94e1db65abb6\",\"name\":\"Jacklin Altman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/10\/Screen-Shot-2022-10-06-at-2.24.26-PM-150x150.png\",\"contentUrl\":\"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/10\/Screen-Shot-2022-10-06-at-2.24.26-PM-150x150.png\",\"caption\":\"Jacklin Altman\"},\"description\":\"Product Team\",\"url\":\"https:\/\/ionic.io\/blog\/author\/jacklin\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Get Proactive About Data Security - Ionic Blog","description":"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security","og_locale":"en_US","og_type":"article","og_title":"Get Proactive About Data Security","og_description":"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?","og_url":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security","og_site_name":"Ionic Blog","article_published_time":"2022-12-15T14:13:55+00:00","article_modified_time":"2022-12-15T16:17:03+00:00","og_image":[{"width":2240,"height":1120,"url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","type":"image\/png"}],"author":"Jacklin Altman","twitter_card":"summary_large_image","twitter_creator":"@ionicframework","twitter_site":"@ionicframework","twitter_misc":{"Written by":"Jacklin Altman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#article","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security"},"author":{"name":"Jacklin Altman","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/6fbceef43a19a3a9c39b94e1db65abb6"},"headline":"Get Proactive About Data Security","datePublished":"2022-12-15T14:13:55+00:00","dateModified":"2022-12-15T16:17:03+00:00","mainEntityOfPage":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security"},"wordCount":704,"commentCount":0,"publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"image":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","keywords":["Ionic Enterprise SDK"],"articleSection":["All","Perspectives"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/ionic.io\/blog\/get-proactive-about-data-security#respond"]}]},{"@type":"WebPage","@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security","url":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security","name":"Get Proactive About Data Security - Ionic Blog","isPartOf":{"@id":"https:\/\/ionic.io\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage"},"image":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage"},"thumbnailUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","datePublished":"2022-12-15T14:13:55+00:00","dateModified":"2022-12-15T16:17:03+00:00","description":"Data breaches are becoming more commonplace and more costly, making data security a top priority. How can you protect your customers and data?","breadcrumb":{"@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/ionic.io\/blog\/get-proactive-about-data-security"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#primaryimage","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","width":2240,"height":1120},{"@type":"BreadcrumbList","@id":"https:\/\/ionic.io\/blog\/get-proactive-about-data-security#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/ionic.io\/blog"},{"@type":"ListItem","position":2,"name":"Get Proactive About Data Security"}]},{"@type":"WebSite","@id":"https:\/\/ionic.io\/blog\/#website","url":"https:\/\/ionic.io\/blog\/","name":"ionic.io\/blog","description":"Build amazing native and progressive web apps with the web","publisher":{"@id":"https:\/\/ionic.io\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/ionic.io\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/ionic.io\/blog\/#organization","name":"Ionic","url":"https:\/\/ionic.io\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2020\/10\/white-on-color.png","width":1920,"height":854,"caption":"Ionic"},"image":{"@id":"https:\/\/ionic.io\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/ionicframework"]},{"@type":"Person","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/6fbceef43a19a3a9c39b94e1db65abb6","name":"Jacklin Altman","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/ionic.io\/blog\/#\/schema\/person\/image\/","url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/10\/Screen-Shot-2022-10-06-at-2.24.26-PM-150x150.png","contentUrl":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/10\/Screen-Shot-2022-10-06-at-2.24.26-PM-150x150.png","caption":"Jacklin Altman"},"description":"Product Team","url":"https:\/\/ionic.io\/blog\/author\/jacklin"}]}},"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"https:\/\/ionic.io\/blog\/wp-content\/uploads\/2022\/11\/mobilesecurity3-feature-image.png","_links":{"self":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4541","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/users\/100"}],"replies":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/comments?post=4541"}],"version-history":[{"count":1,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4541\/revisions"}],"predecessor-version":[{"id":4581,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/posts\/4541\/revisions\/4581"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media\/4542"}],"wp:attachment":[{"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/media?parent=4541"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/categories?post=4541"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ionic.io\/blog\/wp-json\/wp\/v2\/tags?post=4541"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}