{"id":1310,"date":"2020-05-22T08:50:08","date_gmt":"2020-05-22T03:20:08","guid":{"rendered":"https:\/\/www.urolime.com\/blogs\/?p=1310"},"modified":"2021-09-19T18:17:16","modified_gmt":"2021-09-19T12:47:16","slug":"security-risks-of-managing-it-in-house","status":"publish","type":"post","link":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/","title":{"rendered":"Security risks of managing IT in-house"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">As per the NTT Ltd.\u2019s 2020 Global Managed Services Report, 57% of organizations who participated in the survey cited security risks of managing IT in-house as a crucial challenge.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As businesses are slowly adapting to the new normal due to the repercussion of COVID-19 pandemic lockdown, IT Managed service companies in India are attempting to increase their value through security offerings, technical expertise, and ability to deliver outcomes aligned to business goals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">With the current COVID-19 crisis, there is an increase in companies mentioning security risks as a key challenge. We can see a majority of organizations are turning to <a href=\"https:\/\/www.urolime.com\/managed-it-services.html\">IT Managed service companies in India<\/a> for their support in reducing security risks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">As organizations are keen to make use of the expertise of IT Managed service companies in India over the next 18 months and make profound relationships, the delivery of platform-enabled solutions across the entire technology stack becomes more vital.\u00a0 The criticality of security on the business agenda is enhanced by the changing of endpoints into remote environments coupled with a rise in BYOD or Bring your own Device. Threat actors are exploiting people working from home, and likely, on inadequately secured devices and networks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations are now no longer hesitant to purchase security as 32% of respondents in the survey rated it as the most vital factor when compared to 30% who voted for improved operational efficiency and 29% for better performance and availability. In fact, remote security approvals were the core reason for a lot of reported work delays by IT companies in Q4.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism. They want the support of experienced IT Managed service companies in India to take up this immediate priority. Usually, during this disruptive period, organizations may take stock and pull back on innovation projects. However, transformation remains alive \u2013 it simply pivots towards the end-user.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Global Managed Services Report says how 48% of organizations surveyed recognized the need to optimize the workplace environment to meet the demands of an evolving workforce. The Q4 results reported by the Indian IT sector, majority companies notified that clients are spending on these run-the-business projects without fail.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">When working remotely, to ensure employees remain connected securely, productively, and efficiently is top of the management agenda the organizations are required to outsource more of their IT to IT Managed service companies in India than they insource and this trend is expected to increase in the coming months.<\/span><\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1310\" class=\"pvc_stats all  \" data-element-id=\"1310\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"excerpt":{"rendered":"<p>As per the NTT Ltd.\u2019s 2020 Global Managed Services Report, 57% of organizations who participated in the survey cited security risks of managing IT in-house as a crucial challenge. As businesses are slowly adapting to the new normal due to the repercussion of COVID-19 pandemic lockdown, IT Managed service companies in India are attempting to [&hellip;]<\/p>\n<div class=\"pvc_clear\"><\/div>\n<p id=\"pvc_stats_1310\" class=\"pvc_stats all  \" data-element-id=\"1310\" style=\"\"><i class=\"pvc-stats-icon medium\" aria-hidden=\"true\"><svg aria-hidden=\"true\" focusable=\"false\" data-prefix=\"far\" data-icon=\"chart-bar\" role=\"img\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" viewBox=\"0 0 512 512\" class=\"svg-inline--fa fa-chart-bar fa-w-16 fa-2x\"><path fill=\"currentColor\" d=\"M396.8 352h22.4c6.4 0 12.8-6.4 12.8-12.8V108.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v230.4c0 6.4 6.4 12.8 12.8 12.8zm-192 0h22.4c6.4 0 12.8-6.4 12.8-12.8V140.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v198.4c0 6.4 6.4 12.8 12.8 12.8zm96 0h22.4c6.4 0 12.8-6.4 12.8-12.8V204.8c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v134.4c0 6.4 6.4 12.8 12.8 12.8zM496 400H48V80c0-8.84-7.16-16-16-16H16C7.16 64 0 71.16 0 80v336c0 17.67 14.33 32 32 32h464c8.84 0 16-7.16 16-16v-16c0-8.84-7.16-16-16-16zm-387.2-48h22.4c6.4 0 12.8-6.4 12.8-12.8v-70.4c0-6.4-6.4-12.8-12.8-12.8h-22.4c-6.4 0-12.8 6.4-12.8 12.8v70.4c0 6.4 6.4 12.8 12.8 12.8z\" class=\"\"><\/path><\/svg><\/i> <img loading=\"lazy\" decoding=\"async\" width=\"16\" height=\"16\" alt=\"Loading\" src=\"https:\/\/www.urolime.com\/blogs\/wp-content\/plugins\/page-views-count\/ajax-loader-2x.gif\" border=0 \/><\/p>\n<div class=\"pvc_clear\"><\/div>\n","protected":false},"author":1,"featured_media":1319,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","sfsi_plus_gutenberg_text_before_share":"","sfsi_plus_gutenberg_show_text_before_share":"","sfsi_plus_gutenberg_icon_type":"","sfsi_plus_gutenberg_icon_alignemt":"","sfsi_plus_gutenburg_max_per_row":"","rop_custom_images_group":[],"rop_custom_messages_group":[],"rop_publish_now":"initial","rop_publish_now_accounts":[],"rop_publish_now_history":[],"rop_publish_now_status":"pending","footnotes":""},"categories":[7],"tags":[642,650,646,656,657,647,658],"class_list":["post-1310","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-it-security-services","tag-cloud-managed-service-providers-in-india","tag-it-managed-service-companies-in-india","tag-managed-service-providers-in-india","tag-managed-service-providers-india","tag-managed-services-companies-in-india","tag-top-managed-service-providers-in-india","tag-top-managed-services-companies-in-india"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.3.1 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Security risks of managing IT in-house<\/title>\n<meta name=\"description\" content=\"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Security risks of managing IT in-house\" \/>\n<meta property=\"og:description\" content=\"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\" \/>\n<meta property=\"og:site_name\" content=\"Urolime Blogs\" \/>\n<meta property=\"article:published_time\" content=\"2020-05-22T03:20:08+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-09-19T12:47:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png\" \/>\n\t<meta property=\"og:image:width\" content=\"768\" \/>\n\t<meta property=\"og:image:height\" content=\"432\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Urolime Technologies\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Urolime Technologies\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\"},\"author\":{\"name\":\"Urolime Technologies\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\"},\"headline\":\"Security risks of managing IT in-house\",\"datePublished\":\"2020-05-22T03:20:08+00:00\",\"dateModified\":\"2021-09-19T12:47:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\"},\"wordCount\":420,\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png\",\"keywords\":[\"Cloud Managed service providers in india\",\"IT managed service companies in India\",\"Managed service providers in india\",\"managed service providers India\",\"managed services companies in India\",\"top Managed service providers in india\",\"top managed services companies in India\"],\"articleSection\":[\"IT Security Services\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\",\"name\":\"Security risks of managing IT in-house\",\"isPartOf\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png\",\"datePublished\":\"2020-05-22T03:20:08+00:00\",\"dateModified\":\"2021-09-19T12:47:16+00:00\",\"description\":\"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png\",\"width\":768,\"height\":432,\"caption\":\"URO BLOG 15\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#website\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"name\":\"Urolime Blogs\",\"description\":\"The place for DevOps, Cloud, Kubernetes News and Updates\",\"publisher\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#organization\",\"name\":\"Urolime Blogs\",\"url\":\"https:\/\/www.urolime.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"contentUrl\":\"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg\",\"width\":250,\"height\":73,\"caption\":\"Urolime Blogs\"},\"image\":{\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c\",\"name\":\"Urolime Technologies\",\"description\":\"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.\",\"sameAs\":[\"https:\/\/www.urolime.com\/\"],\"url\":\"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Security risks of managing IT in-house","description":"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/","og_locale":"en_US","og_type":"article","og_title":"Security risks of managing IT in-house","og_description":"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.","og_url":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/","og_site_name":"Urolime Blogs","article_published_time":"2020-05-22T03:20:08+00:00","article_modified_time":"2021-09-19T12:47:16+00:00","og_image":[{"width":768,"height":432,"url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png","type":"image\/png"}],"author":"Urolime Technologies","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Urolime Technologies","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#article","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/"},"author":{"name":"Urolime Technologies","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c"},"headline":"Security risks of managing IT in-house","datePublished":"2020-05-22T03:20:08+00:00","dateModified":"2021-09-19T12:47:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/"},"wordCount":420,"publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png","keywords":["Cloud Managed service providers in india","IT managed service companies in India","Managed service providers in india","managed service providers India","managed services companies in India","top Managed service providers in india","top managed services companies in India"],"articleSection":["IT Security Services"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/","url":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/","name":"Security risks of managing IT in-house","isPartOf":{"@id":"https:\/\/www.urolime.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage"},"thumbnailUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png","datePublished":"2020-05-22T03:20:08+00:00","dateModified":"2021-09-19T12:47:16+00:00","description":"Organizations now are making a considerable shift in the approach and are prioritizing security as a primary response and recovery mechanism.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/security-risks-of-managing-it-in-house\/#primaryimage","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2020\/05\/URO-BLOG-15.png","width":768,"height":432,"caption":"URO BLOG 15"},{"@type":"WebSite","@id":"https:\/\/www.urolime.com\/blogs\/#website","url":"https:\/\/www.urolime.com\/blogs\/","name":"Urolime Blogs","description":"The place for DevOps, Cloud, Kubernetes News and Updates","publisher":{"@id":"https:\/\/www.urolime.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.urolime.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.urolime.com\/blogs\/#organization","name":"Urolime Blogs","url":"https:\/\/www.urolime.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","contentUrl":"https:\/\/www.urolime.com\/blogs\/wp-content\/uploads\/2021\/06\/cropped-250-x250.jpg","width":250,"height":73,"caption":"Urolime Blogs"},"image":{"@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/www.urolime.com\/blogs\/#\/schema\/person\/c231f59d5f2c2516e0efc6067ee0c22c","name":"Urolime Technologies","description":"Urolime Technologies has made groundbreaking accomplishments in the field of Google Cloud &amp; Kubernetes Consulting, DevOps Services, 24\/7 Managed Services &amp; Support, Dedicated IT Team, Managed AWS Consulting and Azure Cloud Consulting. We believe our customers are Smart to choose their IT Partner, and we \u201cDo IT Smart\u201d.","sameAs":["https:\/\/www.urolime.com\/"],"url":"https:\/\/www.urolime.com\/blogs\/author\/blogadmin\/"}]}},"_links":{"self":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1310","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/comments?post=1310"}],"version-history":[{"count":2,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1310\/revisions"}],"predecessor-version":[{"id":1323,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/posts\/1310\/revisions\/1323"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media\/1319"}],"wp:attachment":[{"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/media?parent=1310"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/categories?post=1310"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.urolime.com\/blogs\/wp-json\/wp\/v2\/tags?post=1310"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}