{"id":4436,"date":"2021-10-24T21:20:19","date_gmt":"2021-10-24T15:50:19","guid":{"rendered":"https:\/\/www.codelattice.com\/blog\/?p=4436"},"modified":"2026-02-27T18:41:33","modified_gmt":"2026-02-27T13:11:33","slug":"what-should-i-do-if-ive-been-hacked","status":"publish","type":"post","link":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/","title":{"rendered":"What Should I Do If I\u2019ve Been hacked?"},"content":{"rendered":"\r\n<p>There\u2019s nothing scarier in the modern era than being hacked. So much of our lives and lifestyles are tied to the Internet, and turning the computer on one day to discover that you can\u2019t log in to your email or social media accounts because a hacker has gained access to them is an incredibly stressful experience.<\/p>\r\n\r\n\r\n\r\n<p>If this has happened to you, take a deep breath, and work quickly, but calmly. The damage is unlikely to be as bad as the worst-case scenarios your brain is currently screaming at you.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>First steps<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>The first thing you need to do is get access back to every compromised account, and immediately change the passwords to something entirely new. Most online accounts have some kind of restore process, however, if the hacker has changed the restore details (for example, the backup email for password resets from yours to theirs), then you might need to contact the service provider for more information on how to get control back.<\/p>\r\n\r\n\r\n\r\n<p>Once you\u2019ve got access to your account back, immediately switch on two-factor authentication, which will send your phone (or other nominated device) a code when you try and log in. Unless the hacker has control of your phone as well, then, simply having the password to your accounts will no longer be enough to access them.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Next steps<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Once the immediate danger is passed, the next steps are to go through and determine how the hacker was able to gain access, as well as re-secure the IT environment. You\u2019re going to want to do everything from installing new anti-virus and anti-malware software to check your PC to see if there\u2019s a keylogger or other similar program that a hacker is using to collect your passwords, through to changing the name of your WiFi Internet, so the hacker can no longer find which Internet connection is yours.<\/p>\r\n\r\n\r\n\r\n<p>In most cases, hackers rely on people making simple mistakes and clicking on the wrong attachment in the wrong email, or leaving their home network wide open and unsecured by not considering the security of the router itself. The stories of hackers brute-forcing their way into your computer and accounts is greatly over-exaggerated \u2013 unless you\u2019re a high profile politician, CEO, or celebrity, you\u2019re not going to catch the attention of those kinds of hackers.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Remain vigilant<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Depending on what accounts the hackers got access to, the final steps are an ongoing concern; you need to keep an eye out for the impact of the hack. Firstly \u2013 tell your friends and family, and those on your social networks. This is important because the hacker might use the information they\u2019ve found on you to target those in your circle next.<\/p>\r\n\r\n\r\n\r\n<p>Then look back through your more critical emails and any interactions you might have had with government agencies, employers, or banks. Assume that the hackers downloaded all of your email data (which, if you act quickly enough, is unlikely, but prepare for the worst), and therefore assume that if you provided your tax file number or credit card details, then it\u2019s likely the hacker has those.<\/p>\r\n\r\n\r\n\r\n<p>What you need to do is immediately contact any organization you have credit with to let them know and put a mark on your file. Consider canceling all credit cards and getting new ones issued.<\/p>\r\n\r\n\r\n\r\n<h2 class=\"wp-block-heading\"><strong>Contact credit reporting agencies<\/strong><\/h2>\r\n\r\n\r\n\r\n<p>Contact all the major credit reporting agencies, and ask them to put a freeze on you. They\u2019ll give you a password or other details that you can use to unfreeze the account, and whatever you do, don\u2019t lose that. As long as your account is frozen, any applications for credit will be immediately declined, and this means that if the hacker has enough information on you to apply for credit, then they won\u2019t be successful thanks to the freeze.\u00a0<\/p>\r\n\r\n\r\n\r\n<p>Just make sure you don\u2019t lose the password provided to you by the reporting company, else you\u2019ll never be able to access credit again. By staying calm and working methodically, you will be able to mitigate against the damage that a hack does to you, and prevent it from happening again in the future. It\u2019s those that panic that ends up making even greater mistakes and that simply benefits the hackers.<\/p>\r\n","protected":false},"excerpt":{"rendered":"<p>There\u2019s nothing scarier in the modern era than being hacked. So much of our lives and lifestyles are tied to the Internet, and turning the computer on one day to discover that you can\u2019t log in to your email or social media accounts because a hacker has gained access to them is an incredibly stressful [&hellip;]<\/p>\n","protected":false},"author":37,"featured_media":4437,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[375,376],"tags":[],"class_list":["post-4436","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-digital-experience","category-water-cooler"],"acf":{"heading_txt":"","webp":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp","faq":""},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What Should I Do If I\u2019ve Been hacked? - Codelattice Blog<\/title>\n<meta name=\"description\" content=\"Don&#039;t panic! If you&#039;ve been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Should I Do If I\u2019ve Been hacked? - Codelattice Blog\" \/>\n<meta property=\"og:description\" content=\"Don&#039;t panic! If you&#039;ve been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Codelattice Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/codelattice\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-24T15:50:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-27T13:11:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp\" \/>\n\t<meta property=\"og:image:width\" content=\"600\" \/>\n\t<meta property=\"og:image:height\" content=\"344\" \/>\n<meta name=\"author\" content=\"Luke Fitzpatrick\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"What Should I Do If I\u2019ve Been hacked?\" \/>\n<meta name=\"twitter:description\" content=\"Don&#039;t panic! If you&#039;ve been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp\" \/>\n<meta name=\"twitter:creator\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:site\" content=\"@Codelattice\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Luke Fitzpatrick\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\"},\"author\":{\"name\":\"Luke Fitzpatrick\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/6bcd27d2b70127409016846eedec67a9\"},\"headline\":\"Codelattice Blog\",\"datePublished\":\"2021-10-24T15:50:19+00:00\",\"dateModified\":\"2026-02-27T13:11:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\"},\"wordCount\":727,\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked-1.jpg\",\"articleSection\":[\"Digital Experience\",\"Water Cooler\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\",\"name\":\"What Should I Do If I\u2019ve Been hacked? - Codelattice Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked-1.jpg\",\"datePublished\":\"2021-10-24T15:50:19+00:00\",\"dateModified\":\"2026-02-27T13:11:33+00:00\",\"description\":\"Don't panic! If you've been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp\",\"width\":600,\"height\":344,\"thumbnailUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.codelattice.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Codelattice Blog\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#website\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"name\":\"Codelattice Blog\",\"description\":\"Home\",\"publisher\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#organization\",\"name\":\"Codelattice\",\"url\":\"https:\/\/www.codelattice.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"contentUrl\":\"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png\",\"width\":366,\"height\":366,\"caption\":\"Codelattice\"},\"image\":{\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/codelattice\",\"https:\/\/x.com\/Codelattice\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/6bcd27d2b70127409016846eedec67a9\",\"name\":\"Luke Fitzpatrick\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/904d00189f95dfae81c0122eb8a2ad5e063785ab63e0776471b02b0f959f4c1a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/904d00189f95dfae81c0122eb8a2ad5e063785ab63e0776471b02b0f959f4c1a?s=96&d=mm&r=g\",\"caption\":\"Luke Fitzpatrick\"},\"description\":\"Luke Fitzpatrick has been published in Forbes, Yahoo! News and Influencive. He is also a guest lecturer at the University of Sydney, lecturing in Cross-Cultural Management and the Pre-MBA Program. You can connect with him on LinkedIn.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Should I Do If I\u2019ve Been hacked? - Codelattice Blog","description":"Don't panic! If you've been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/","og_locale":"en_US","og_type":"article","og_title":"What Should I Do If I\u2019ve Been hacked? - Codelattice Blog","og_description":"Don't panic! If you've been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.","og_url":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/","og_site_name":"Codelattice Blog","article_publisher":"https:\/\/www.facebook.com\/codelattice","article_published_time":"2021-10-24T15:50:19+00:00","article_modified_time":"2026-02-27T13:11:33+00:00","og_image":[{"width":600,"height":344,"url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp","type":""}],"author":"Luke Fitzpatrick","twitter_card":"summary_large_image","twitter_title":"What Should I Do If I\u2019ve Been hacked?","twitter_description":"Don't panic! If you've been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.","twitter_image":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp","twitter_creator":"@Codelattice","twitter_site":"@Codelattice","twitter_misc":{"Written by":"Luke Fitzpatrick","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#article","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/"},"author":{"name":"Luke Fitzpatrick","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/6bcd27d2b70127409016846eedec67a9"},"headline":"Codelattice Blog","datePublished":"2021-10-24T15:50:19+00:00","dateModified":"2026-02-27T13:11:33+00:00","mainEntityOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/"},"wordCount":727,"publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked-1.jpg","articleSection":["Digital Experience","Water Cooler"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/","url":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/","name":"What Should I Do If I\u2019ve Been hacked? - Codelattice Blog","isPartOf":{"@id":"https:\/\/www.codelattice.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked-1.jpg","datePublished":"2021-10-24T15:50:19+00:00","dateModified":"2026-02-27T13:11:33+00:00","description":"Don't panic! If you've been hacked, follow these immediate steps to regain account access, enable 2FA, and protect your credit. Learn how to mitigate the damage.","breadcrumb":{"@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#primaryimage","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp","width":600,"height":344,"thumbnailUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2021\/10\/What-Should-I-Do-If-Ive-Been-hacked.webp"},{"@type":"BreadcrumbList","@id":"https:\/\/www.codelattice.com\/blog\/what-should-i-do-if-ive-been-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.codelattice.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Codelattice Blog"}]},{"@type":"WebSite","@id":"https:\/\/www.codelattice.com\/blog\/#website","url":"https:\/\/www.codelattice.com\/blog\/","name":"Codelattice Blog","description":"Home","publisher":{"@id":"https:\/\/www.codelattice.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.codelattice.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.codelattice.com\/blog\/#organization","name":"Codelattice","url":"https:\/\/www.codelattice.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","contentUrl":"https:\/\/www.codelattice.com\/blog\/wp-content\/uploads\/2024\/12\/cl-logo-icon.png","width":366,"height":366,"caption":"Codelattice"},"image":{"@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/codelattice","https:\/\/x.com\/Codelattice"]},{"@type":"Person","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/6bcd27d2b70127409016846eedec67a9","name":"Luke Fitzpatrick","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.codelattice.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/904d00189f95dfae81c0122eb8a2ad5e063785ab63e0776471b02b0f959f4c1a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/904d00189f95dfae81c0122eb8a2ad5e063785ab63e0776471b02b0f959f4c1a?s=96&d=mm&r=g","caption":"Luke Fitzpatrick"},"description":"Luke Fitzpatrick has been published in Forbes, Yahoo! News and Influencive. He is also a guest lecturer at the University of Sydney, lecturing in Cross-Cultural Management and the Pre-MBA Program. You can connect with him on LinkedIn."}]}},"_links":{"self":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/4436","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/users\/37"}],"replies":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/comments?post=4436"}],"version-history":[{"count":3,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/4436\/revisions"}],"predecessor-version":[{"id":7262,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/posts\/4436\/revisions\/7262"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media\/4437"}],"wp:attachment":[{"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/media?parent=4436"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/categories?post=4436"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.codelattice.com\/blog\/wp-json\/wp\/v2\/tags?post=4436"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}