{"id":1561,"date":"2020-11-13T23:13:03","date_gmt":"2020-11-13T23:13:03","guid":{"rendered":"http:\/\/staging4.havemoreinfluence.com\/?page_id=1561"},"modified":"2021-01-22T22:16:56","modified_gmt":"2021-01-22T22:16:56","slug":"enterprise-defenses","status":"publish","type":"page","link":"https:\/\/staging4.havemoreinfluence.com\/enterprise-defenses\/","title":{"rendered":"Enterprise Defenses"},"content":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” custom_padding_last_edited=”off|desktop” admin_label=”Header” _builder_version=”4.6.0″ z_index=”2″ overflow-y=”visible” custom_padding_tablet=”||15vw|” custom_padding_phone=”||25vw” border_color_all=”#31d190″ locked=”off”][et_pb_fullwidth_slider show_image_video_mobile=”on” _builder_version=”4.7.7″ header_level=”h1″ header_font=”Bold|800||on|||||” header_font_size=”4vw” header_line_height=”1.1em” body_font=”Camingos Dos Regular|600|||||||” body_font_size=”18px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0.12)” custom_button=”on” button_text_size=”16px” button_text_color=”#ffffff” button_bg_color=”#31d190″ button_border_width=”10px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”0px” button_font=”Camingos Dos Regular|700|||||||” button_use_icon=”off” button_custom_margin_tablet=”” button_custom_margin_phone=”||30px||false|false” button_custom_margin_last_edited=”on|tablet” button_custom_padding_tablet=”” button_custom_padding_phone=”||||false|false” button_custom_padding_last_edited=”on|phone” max_width=”100%” overflow-y=”visible” custom_padding=”||” custom_padding_tablet=”” custom_padding_phone=”100px||100px||true|false” custom_padding_last_edited=”on|phone” header_font_size_tablet=”8vw” header_font_size_phone=”30px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”16px” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” body_line_height_tablet=”1.8em” body_line_height_phone=”1.7em” body_line_height_last_edited=”off|phone” custom_css_slide_image=”max-width: 440px;” text_shadow_style=”preset1″ text_shadow_color=”rgba(0,0,0,0)” button_bg_color__hover=”#000000″][et_pb_slide heading=”enterprise defenses” button_text=”Learn More” button_link=”#more” image=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/Neil-Daswani_3D.png” arrows_custom_color=”#000000″ dot_nav_custom_color=”#000000″ image_tablet=”” image_phone=”” image_last_edited=”on|phone” _builder_version=”4.7.7″ use_background_color_gradient=”on” background_color_gradient_start=”#000000″ background_color_gradient_end=”#80b1e2″ background_color_gradient_direction=”124deg” background_color_gradient_start_position=”11%” background_color_gradient_end_position=”87%” background_enable_image=”off” background_position=”bottom_center” custom_button=”on” button_bg_color=”#000000″ button_font=”||||||||” custom_padding_tablet=”” custom_padding_phone=”||40px||false|false” custom_padding_last_edited=”on|tablet” custom_css_slide_container=”max-width: 80%;” sticky_transition=”on”]<\/p>\n

Learn how staying vigilant can protect you and your data.<\/p>\n

[\/et_pb_slide][\/et_pb_fullwidth_slider][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Promo” _builder_version=”3.22.7″ locked=”off”][et_pb_row module_id=”more” _builder_version=”4.7.7″ background_color=”#000000″ custom_padding=”8vw|8vw|8vw|8vw”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/output-onlinepngtools-16.png” title_text=”output-onlinepngtools (16)” align=”center” _builder_version=”4.6.0″ always_center_on_mobile=”off”][\/et_pb_image][et_pb_text _builder_version=”4.7.7″ text_font=”||||||||” header_font=”||||||||” header_2_font=”Bold|800||on|||||” header_2_font_size=”45px” header_2_line_height=”1.2em” text_orientation=”center” background_layout=”dark” module_alignment=”right” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop” locked=”off”]<\/p>\n

The root causes of data breaches are phishing, malware, software vulnerabilities, third-party compromise and abuse, unencrypted data, and inadvertent employee mistakes.<\/h2>\n

[\/et_pb_text][et_pb_button button_url=”#resources” button_text=”View Resources” button_alignment=”center” _builder_version=”4.7.7″ custom_button=”on” button_text_size=”16px” button_text_color=”#ffffff” button_bg_color=”#80b1e2″ button_border_width=”0px” button_border_radius=”0px” button_font=”Montserrat|700|||||||” button_use_icon=”off” custom_margin=”||16px” custom_padding=”18px|40px|18px|40px|true|true” locked=”off” button_bg_color__hover_enabled=”on” button_bg_color__hover=”rgba(255,255,255,0)” button_text_color__hover=”#ffffff” button_border_color__hover_enabled=”on” button_border_color__hover=”rgba(0,0,0,0)”][\/et_pb_button][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”About” _builder_version=”3.22.7″ locked=”off”][et_pb_row column_structure=”1_2,1_2″ module_id=”resources” _builder_version=”4.7.7″][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/output-onlinepngtools-17.png” title_text=”output-onlinepngtools (17)” _builder_version=”4.6.0″ animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][et_pb_text _builder_version=”4.6.0″ header_font=”||||||||” header_2_font=”Bold|800||on|||||” header_2_text_color=”#000000″ header_2_font_size=”60px” header_2_line_height=”1.2em” module_alignment=”right” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop” locked=”off”]<\/p>\n

what we recommend<\/h2>\n

[\/et_pb_text][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/pexels-markus-spiske-1089438-1.jpg” title_text=”pexels-markus-spiske-1089438 (1)” disabled_on=”on|on|off” _builder_version=”4.6.0″ max_width_tablet=”200px” max_width_phone=”” max_width_last_edited=”on|desktop” animation_direction=”bottom” border_radii=”on|30px|30px|30px|30px” box_shadow_style=”preset1″ always_center_on_mobile=”off”][\/et_pb_image][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”84px|||” custom_padding_tablet=”0px|||” custom_padding_phone=”” custom_padding_last_edited=”on|tablet” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”Camingos Dos Regular|700|||||||” text_text_color=”#000000″ text_font_size=”18px” text_line_height=”1.8em” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” locked=”off”]<\/p>\n

We\u2019ve reviewed enterprise products with leading security experts to provide you with top provider recommendations.<\/p>\n

[\/et_pb_text][et_pb_accordion _builder_version=”4.7.7″ _module_preset=”default” toggle_font=”Bold|700|||||||” closed_toggle_font=”Bold|700|||||||” body_font=”Camingos Dos Regular||||||||”][et_pb_accordion_item title=”Protect against phishing.” open=”on” _builder_version=”4.6.0″ _module_preset=”default”]<\/p>\n

We recommend Agari<\/a>, DomainTools PhishEye<\/a>, Shape Security<\/a>, Yubikey<\/a>.<\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Protect from malware.” _builder_version=”4.6.0″ _module_preset=”default” open=”off”]<\/p>\n

We recommend Blue Hexagon<\/a>, Cyberinc Isla<\/a>, Broadcom<\/a>.<\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Protect against software vulnerabilities.” _builder_version=”4.6.0″ _module_preset=”default” open=”off”]<\/p>\n

We recommend Aegis open-source vulnerability management Blackduck (Synopsys)<\/a>, Coverity (Synopsys)<\/a>, DeepFactor<\/a>, Kenna Security<\/a>, Opsera<\/a>,\u00a0<\/p>\n

Rapid7<\/a>, Nexpose<\/a>, and Tinfoil (Synopsys)<\/a>.<\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Protect from third party breaches.” _builder_version=”4.6.0″ _module_preset=”default” open=”off”]<\/p>\n

We recommend RSA Archer<\/a> and SecurityScorecard<\/a>.<\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Protect against unencrypted data.” _builder_version=”4.7.7″ _module_preset=”default” open=”off”]<\/p>\n

We recommend enabling BitLocker<\/a> and FileVault<\/a> on all endpoints. Additionally, MobileIron MDM<\/a> requires all employees to have PIN codes set on their phones.<\/p>\n

[\/et_pb_accordion_item][et_pb_accordion_item title=”Protect from inadvertent employee mistakes.” _builder_version=”4.6.0″ _module_preset=”default” open=”off”]<\/p>\n

We recommend\u00a0Elevate Security<\/a>, Secure Code Warrior<\/a>, and\u00a0Symantec Data Loss Prevention<\/a>.\u00a0<\/p>\n

[\/et_pb_accordion_item][\/et_pb_accordion][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ admin_label=”Testimonials” _builder_version=”3.22.7″ custom_padding=”0px|||||” locked=”off”][et_pb_row _builder_version=”3.25″ width=”90%” module_alignment=”right” box_shadow_style=”preset3″ box_shadow_vertical=”-17px” box_shadow_blur=”80px” box_shadow_spread=”-20px” box_shadow_color=”rgba(0,0,0,0.17)”][et_pb_column type=”4_4″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2020\/11\/author-icon-12-4-2.png” align=”center” _builder_version=”3.23″ width=”50px” always_center_on_mobile=”off”][\/et_pb_image][et_pb_slider _builder_version=”4.7.7″ header_level=”h4″ header_font=”Bold|700|||||||” header_text_color=”#000000″ header_font_size=”26px” header_line_height=”1.6em” body_font=”Camingos Dos Regular|700|||||||” body_text_color=”#31d190″ background_color=”rgba(255,255,255,0)” custom_padding=”0px||65px|||” hover_enabled=”0″ header_font_size_tablet=”20px” header_font_size_phone=”18px” header_font_size_last_edited=”on|phone” text_shadow_style=”preset1″ text_shadow_color=”rgba(0,0,0,0)” sticky_enabled=”0″][et_pb_slide heading=”Taking a systemic, comprehensive, and whole-of-enterprise view of security breaches is not only good practice, it should become the standard by which security programs are evaluated. Capturing pragmatic, practitioner-driven insights makes this book valuable to members of the board, business executives, as well as technology leaders such as CISOs, CIOs, and CTOs.” arrows_custom_color=”#000000″ dot_nav_custom_color=”#000000″ _builder_version=”4.7.7″ body_text_color=”#80b1e2″ hover_enabled=”0″ sticky_transition=”on” sticky_enabled=”0″]<\/p>\n

\n
\n
Matt Stamper, co-author of the CISO Desk Reference Guide (Volumes 1 & 2), former research director for Gartner (covering incident response), and CISO & Executive Advisor at EVOTEK.<\/span><\/div>\n<\/div>\n<\/div>\n

[\/et_pb_slide][\/et_pb_slider][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ disabled_on=”off|off|off” admin_label=”Call To Action” module_id=”contact” _builder_version=”4.7.7″ background_color=”#80b1e2″ transform_translate=”-10px|0px” transform_translate_linked=”off” width=”93%” module_alignment=”right” custom_margin=”||6vw|||” custom_margin_tablet=”||20vw|” custom_margin_phone=”” custom_margin_last_edited=”on|phone” custom_padding=”||72px|||” border_color_all=”#000000″ border_width_right=”6vw” border_color_right=”#ffffff” box_shadow_style=”preset4″ box_shadow_vertical=”0px” box_shadow_color=”#000000″ global_module=”1637″ saved_tabs=”all”][et_pb_row column_structure=”3_5,2_5″ _builder_version=”4.6.0″][et_pb_column type=”3_5″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2020\/11\/author-icon-03-2.png” align=”center” _builder_version=”3.23″ animation_direction=”bottom” always_center_on_mobile=”off”][\/et_pb_image][et_pb_text _builder_version=”4.6.0″ text_font=”Camingos Dos Regular||||||||” text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold||||||||” header_2_font=”Bold|800||on|||||” header_2_font_size=”60px” header_2_line_height=”1.2em” header_3_font=”Bold|700|||||||” header_3_font_size=”16px” header_3_line_height=”1.4em” text_orientation=”center” background_layout=”dark” module_alignment=”right” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_2_font_size_tablet=”40px” header_2_font_size_phone=”25px” header_2_font_size_last_edited=”on|desktop”]<\/p>\n

Big Breaches: Cybersecurity Lessons for Everyone<\/h3>\n

Get in Touch<\/h2>\n

Interested in understanding what cybersecurity is all about, what failures have taken place in the field to date, and how they could have been avoided? This is the book for you. Questions? Contact us below.<\/p>\n

[\/et_pb_text][et_pb_contact_form captcha=”off” _builder_version=”4.7.7″ _module_preset=”default” custom_button=”on” button_text_color=”#ffffff” button_bg_color=”#000000″ button_border_color=”#000000″ button_font=”Camingos Dos Regular||||||||”][et_pb_contact_field field_id=”Name” field_title=”Name” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Email” field_title=”Email Address” field_type=”email” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][et_pb_contact_field field_id=”Message” field_title=”Message” field_type=”text” fullwidth_field=”on” _builder_version=”3.16″ button_text_size__hover_enabled=”off” button_one_text_size__hover_enabled=”off” button_two_text_size__hover_enabled=”off” button_text_color__hover_enabled=”off” button_one_text_color__hover_enabled=”off” button_two_text_color__hover_enabled=”off” button_border_width__hover_enabled=”off” button_one_border_width__hover_enabled=”off” button_two_border_width__hover_enabled=”off” button_border_color__hover_enabled=”off” button_one_border_color__hover_enabled=”off” button_two_border_color__hover_enabled=”off” button_border_radius__hover_enabled=”off” button_one_border_radius__hover_enabled=”off” button_two_border_radius__hover_enabled=”off” button_letter_spacing__hover_enabled=”off” button_one_letter_spacing__hover_enabled=”off” button_two_letter_spacing__hover_enabled=”off” button_bg_color__hover_enabled=”off” button_one_bg_color__hover_enabled=”off” button_two_bg_color__hover_enabled=”off”][\/et_pb_contact_field][\/et_pb_contact_form][\/et_pb_column][et_pb_column type=”2_5″ _builder_version=”4.6.0″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_image src=”http:\/\/staging4.havemoreinfluence.com\/wp-content\/uploads\/2021\/01\/Neil-Daswani_3D.png” title_text=”Neil Daswani_3D” align_tablet=”center” align_phone=”” align_last_edited=”on|desktop” disabled_on=”on|on|off” _builder_version=”4.6.0″ max_width_tablet=”400px” max_width_phone=”” max_width_last_edited=”on|desktop” custom_margin=”||-180px” custom_padding=”|||” animation_direction=”bottom”][\/et_pb_image][\/et_pb_column][\/et_pb_row][\/et_pb_section][et_pb_section fb_built=”1″ custom_padding_last_edited=”on|phone” admin_label=”Footer” module_id=”optin” _builder_version=”4.7.7″ background_color=”#000000″ background_color_gradient_direction=”240deg” background_enable_image=”off” background_size=”contain” background_position=”top_center” custom_margin=”||” custom_padding=”1vw||4vw||false|” custom_padding_tablet=”0vw||4vw||false|” custom_padding_phone=”1vw||4vw||false|” global_module=”1636″ saved_tabs=”all” locked=”off”][et_pb_row column_structure=”1_2,1_2″ _builder_version=”3.25″ max_width=”80%” custom_padding=”42px|||||”][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_text _builder_version=”4.6.0″ text_font=”Camingos Dos Regular||||||||” text_font_size=”18px” text_line_height=”1.8em” header_font=”Bold||||||||” header_2_font=”Bold|800||on|||||” header_2_font_size=”2vw” header_2_line_height=”1.2em” header_3_font=”Bold|700|||||||” header_3_font_size=”16px” header_3_line_height=”1.4em” background_layout=”dark” module_alignment=”right” text_font_size_tablet=”16px” text_font_size_phone=”14px” text_font_size_last_edited=”on|phone” text_line_height_tablet=”1.8em” text_line_height_phone=”1.7em” text_line_height_last_edited=”off|phone” header_2_font_size_tablet=”” header_2_font_size_phone=”8vw” header_2_font_size_last_edited=”on|phone”]<\/p>\n

get a free book chapter.<\/h2>\n

Subscribe to the mailing list to get the entire first chapter of Big Breaches: Cybersecurity Lessons for Everyone\u00a0<\/em>delivered to your inbox, absolutely free!<\/p>\n

[\/et_pb_text][\/et_pb_column][et_pb_column type=”1_2″ _builder_version=”3.25″ custom_padding=”|||” custom_padding__hover=”|||”][et_pb_signup mailchimp_list=”elegantthemestest|b373b2459d” first_name_field=”off” last_name_field=”off” _builder_version=”4.6.0″ form_field_font=”||||||||” form_field_line_height=”1.8em” use_background_color=”off” custom_button=”on” button_text_size=”16px” button_text_color=”#ffffff” button_bg_color=”#80b1e2″ button_border_width=”10px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”0px” button_font=”Montserrat|700|||||||” button_use_icon=”off” border_radii_fields=”on|0px|0px|0px|0px”][\/et_pb_signup][\/et_pb_column][\/et_pb_row][\/et_pb_section]<\/p>\n","protected":false},"excerpt":{"rendered":"

[et_pb_section fb_built=”1″ fullwidth=”on” custom_padding_last_edited=”off|desktop” admin_label=”Header” _builder_version=”4.6.0″ z_index=”2″ overflow-y=”visible” custom_padding_tablet=”||15vw|” custom_padding_phone=”||25vw” border_color_all=”#31d190″ locked=”off”][et_pb_fullwidth_slider show_image_video_mobile=”on” _builder_version=”4.7.7″ header_level=”h1″ header_font=”Bold|800||on|||||” header_font_size=”4vw” header_line_height=”1.1em” body_font=”Camingos Dos Regular|600|||||||” body_font_size=”18px” body_line_height=”1.8em” background_color=”rgba(0,0,0,0.12)” custom_button=”on” button_text_size=”16px” button_text_color=”#ffffff” button_bg_color=”#31d190″ button_border_width=”10px” button_border_color=”rgba(0,0,0,0)” button_border_radius=”0px” button_font=”Camingos Dos Regular|700|||||||” button_use_icon=”off” button_custom_margin_tablet=”” button_custom_margin_phone=”||30px||false|false” button_custom_margin_last_edited=”on|tablet” button_custom_padding_tablet=”” button_custom_padding_phone=”||||false|false” button_custom_padding_last_edited=”on|phone” max_width=”100%” overflow-y=”visible” custom_padding=”||” custom_padding_tablet=”” custom_padding_phone=”100px||100px||true|false” custom_padding_last_edited=”on|phone” header_font_size_tablet=”8vw” header_font_size_phone=”30px” header_font_size_last_edited=”on|desktop” body_font_size_tablet=”16px” body_font_size_phone=”14px” body_font_size_last_edited=”on|phone” body_line_height_tablet=”1.8em” body_line_height_phone=”1.7em” […]<\/p>\n","protected":false},"author":5,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"_et_pb_use_builder":"on","_et_pb_old_content":"","_et_gb_content_width":""},"_links":{"self":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1561"}],"collection":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/comments?post=1561"}],"version-history":[{"count":15,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1561\/revisions"}],"predecessor-version":[{"id":1768,"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/pages\/1561\/revisions\/1768"}],"wp:attachment":[{"href":"https:\/\/staging4.havemoreinfluence.com\/wp-json\/wp\/v2\/media?parent=1561"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}