{"id":22415,"date":"2025-01-23T09:00:33","date_gmt":"2025-01-23T07:00:33","guid":{"rendered":"https:\/\/digitalschoolofmarketing.co.za\/?p=22415"},"modified":"2025-01-17T11:21:55","modified_gmt":"2025-01-17T09:21:55","slug":"implementing-multi-factor-authentication-for-enhanced-cybersecurity","status":"publish","type":"post","link":"https:\/\/digitalschoolofmarketing.co.za\/cyber-security-blog\/implementing-multi-factor-authentication-for-enhanced-cybersecurity\/","title":{"rendered":"Implementing Multi-Factor Authentication for Enhanced Cybersecurity"},"content":{"rendered":"<section class=\"l-section wpb_row height_medium\"><div class=\"l-section-h i-cf\"><div class=\"g-cols vc_row via_grid cols_3-1 laptops-cols_inherit tablets-cols_inherit mobiles-cols_1 valign_top type_default stacking_default\"><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>the advent of sophisticated cyberattacks, passwords are no\u2002longer enough to secure confidential data. Introduction Multi-factor authentication (MFA) has become essential to modern-day cybersecurity\u2002frameworks. MFA is a type of security that requires users to confirm their identity with more than one &#8220;factor,&#8221;\u2002usually combining a password a device or token, or biometric data (something they are).<\/p>\n<p>This multi-layer option makes it much more difficult for anyone to gain unauthorised access, even if one factor is\u2002breached. Multi-factor authentication, which provides an additional layer of security against breaches, phishing attacks, and credential theft, is now being adopted by organisations worldwide.<\/p>\n<h2><strong>Types of Multi-Factor Authentication Methods<\/strong><\/h2>\n<p>Multi-factor authentication uses multiple factors for user verification. The more layers, the better the chances\u2002of avoiding any cyber breaches.<\/p>\n<p>Knowledge Properties: These are things the user knows,\u2002like passwords, PINs, or answers to security questions. This factor is frequently used but is susceptible to phishing and brute-force attacks,\u2002necessitating supplementary layers.<\/p>\n<p>Possession-Based Factors: This is something the user has, like a\u2002hardware token, mobile device, or authentication app. This is where Time-based One-Time Passwords (TOTP)\u2014those generated in cell phone apps like Google Authenticator\u2014have become widespread. This includes push notifications dispatched to\u2002registered devices.<\/p>\n<p>Factors\u2002based on what a user is: Biometric identifiers. Inherence-based methods include fingerprint scans, facial\u2002recognition, and voice authentication. These are hard to copy, adding an extra layer of\u2002<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a>.<\/p>\n<p>Location-Based and Behavioural Factors\u2002\u2014 Location-based authentication verifies a user\u2019s identity based on geographic location or IP address. Emerging as one of the innovative methods\u2002to enhance cybersecurity in recent years has been the use of behavioural factors, such as mouse movements and keystroke patterns.<\/p>\n<p>Employing\u2002a combination of these methods creates a strong multi-factor authentication mechanism and a risk mitigator for single-factor authentication. By selecting the right authentication method according to their requirements, organisations can guarantee both security and user comfort.<\/p>\n<h2><strong>Steps to Implement Multi-Factor Authentication Effectively<\/strong><\/h2>\n<p>Introducing MFA should\u2002be done strategically to ensure it aligns with a <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> framework and achieves the most significant benefits throughout an organisation. Before an organisation can take specific measures to secure itself, it must go through a broad assessment of its security needs\u2002&#8211; in other words; it must take a careful inventory of the systems it manages, how it handles data, and the current threats it faces. This pinpoints locations where multi-factor authentication is needed most, such as access to sensitive data repositories, remote work tools or critical systems.<\/p>\n<p>The following vital point is choosing suitable authentication methods. Multi-factor authentication options\u2002should balance security needs and ease of use. For example, biometric authentication is excellent for high-security areas, and TOTP-based apps work well\u2002for general use. After selection, deployment should be prioritised in high-risk applications\u2002(e-mail, cloud platforms, and financial). Then, slowly start rolling out to all critical systems, focusing on\u2002remote access tools, as these are often the target of cyberattacks.<\/p>\n<p>User education complements\u2002efficient MFA applications. Users should be provided with training to explain what MFA is, why it is important, and how it works so that they can understand how to use\u2002it properly. This avoids\u2002displacement and encourages seamless integration. Testing and monitoring\u2002beforehand can help identify and fix issues before rollout. Iterating based on user feedback can make\u2002the system more secure and usable.<\/p>\n<p>This means policies need constant updating\u2002to keep up with new threats. Integrating New Authentication Methods: As cyber threats evolve, incorporating new and more secure authentication methods alongside the MFA process will\u2002help ensure that your first websites are effective. This way, organisations can achieve multi-factor authentication deployment that secures systems and data and increases user trust\u2002and cybersecurity resilience. When implemented correctly, MFA can be a powerful weapon in the battle\u2002against cyber threats.<\/p>\n<h2><strong>Best Practices for Strengthening Cybersecurity with MFA<\/strong><\/h2>\n<p>Best practices for multi-factor authentication are essential to improve <a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> and enhance usability. These best practices make MFA a foundational element of a holistic cyber defence\u2002plan. Multi-factor authentication\u2002should be enforced for all users, including employees, contractors, and administrators.<\/p>\n<p>Multi-factor authentication must be\u2002enforced for administrative accounts, as they are high-value targets for attackers and are where sensitive systems and data can be exposed. An additional effective practice is implementing risk-based authentication, which adjusts MFA requirements depending on user behaviour, location or device. Entities can employ various means to initiate this approach, such as logging into accounts from a new machine or location and imposing further authentication processes to ensure\u2002the action is reasonable and secure.<\/p>\n<p>The second authentication factor\u2002is equally essential for security. Using MFA over encrypted\u2002channels and avoiding SMS-based second factor\/protocol, which may be interceptable or spoofed, makes MFA more reliable. Furthermore, integrating MFA with existing systems (e.g. Single Sign-On (SSO) platforms and Identity and Access Management (IAM) solutions) enhances\u2002the existing workflows while upholding strong security measures. This minimises users&#8217; login fatigue and maximises\u2002overall productivity.<\/p>\n<p>This\u2002includes conducting regular audits and testing of MFA systems to identify potential vulnerabilities and gaps in implementation. To keep these systems resilient against emergent threats, penetration testing and simulated phishing exercises, for instance, are\u2002conducted. Also, a perennially popular approach in the cybercriminal toolbox, awareness of new kinds of attack vectors, such as an MFA fatigue attack, enables organisations to alter policy and practice to avoid the impact of\u2002these attacks.<\/p>\n<p>Implementing these strategies can strengthen organisational security while\u2002enhancing the end-user experience. When implemented correctly, MFA protects sensitive data and demonstrates a proactive approach to securing one\u2019s digital assets in a cyber\u2002landscape that continues to become more interconnected and vulnerable.<\/p>\n<h2><strong>Conclusion<\/strong><\/h2>\n<p>Two-factor authentication is a key element of modern\u2002<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">cybersecurity<\/a> plans. MFA is necessary because it significantly reduces the risk of cyberattacks by requiring more than one form of verification\u2002so that even if an attacker succeeds in breaching one factor, the others are still secure. Implementing multi-factor authentication requires a well-planned approach, including selecting suitable methods, training users, and collaborating with the organisation\u2019s workflow. Implementing best practices\u2002makes it even more potent for security and user trust. Seamless integration of multi-factor authentication solutions is designed for easy integration with existing systems and applications, minimising the disruption to operational workflows.<\/p>\n<h2><strong><a href=\"https:\/\/digitalschoolofmarketing.co.za\/contact-us\/\">GET IN TOUCH WITH THE DIGITAL SCHOOL OF MARKETING<\/a><\/strong><\/h2>\n<p>Equip yourself with the essential skills to protect digital assets and maintain consumer trust by enrolling in the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\">Cyber Security Course<\/a>\u00a0at the\u00a0<a href=\"https:\/\/digitalschoolofmarketing.co.za\/\">Digital School of Marketing<\/a>. Join us today to become a leader in the dynamic field of cybersecurity.<\/p>\n<p><a href=\"https:\/\/digitalschoolofmarketing.co.za\/courses\/cyber-security-course\/\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-20852 size-woocommerce_single entered lazyloaded\" src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" alt=\"DSM Digital School of Marketing - Cyber Security\" width=\"600\" height=\"96\" data-lazy-srcset=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg 600w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-300x48.jpg 300w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-1024x164.jpg 1024w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-768x123.jpg 768w, https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security.jpg 1250w\" data-lazy-sizes=\"(max-width: 600px) 100vw, 600px\" data-lazy-src=\"https:\/\/digitalschoolofmarketing.co.za\/wp-content\/uploads\/2024\/07\/Cyber-Security-600x96.jpg\" data-ll-status=\"loaded\" \/><\/a><\/p>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><h3>Frequently Asked Questions<\/h3>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><div class=\"w-tabs style_default switch_click accordion has_scrolling\" style=\"--sections-title-size:inherit\"><div class=\"w-tabs-sections titles-align_none icon_chevron cpos_right\"><div class=\"w-tabs-section\" id=\"jd63\"><button class=\"w-tabs-section-header\" aria-controls=\"content-jd63\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What is Multi-Factor Authentication (MFA), and why is it important?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-jd63\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Setting up multi-factor authentication (MFA), for example, is a security procedure that asks users to verify\u2002their identity using two or more factors \u2014 something they know (password), something they own, and something they are (biometric data). This provides an additional layer of security, helping\u2002to prevent unauthorised access. Multi-factor authentication is one\u2002of the most critical lines of defence you can deploy in cybersecurity, as it addresses many of the weaknesses accompanying single-factor authentication, such as stolen or guessed passwords. MFA helps\u2002secure sensitive information, adhere to compliance regulations, and enhance protection against cyber threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"uef9\"><button class=\"w-tabs-section-header\" aria-controls=\"content-uef9\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What are the main types of authentication factors used in MFA?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-uef9\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>MFA is based on three main authentication factors: knowledge-based,\u2002possession-based and inherence-based. Knowledge-based factors include the user&#8217;s knowledge, such as a password or PIN. Possession-based factors need something a user has, like a mobile device, hardware token, or\u2002an authentication app that generates one-time passwords. Inherence-based factors depend on something a user is, for instance, biometric information of data like fingerprints, facial\u2002recognition or voice patterns. Other approaches like geolocation and\u2002behavioural authentication provide even more layers of protection by scrutinising user behaviours or geographic entry points. Combining these provides a strong multi-factor authentication\u2002system that inherently improves cyber security.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"e083\"><button class=\"w-tabs-section-header\" aria-controls=\"content-e083\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How does MFA enhance cybersecurity?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-e083\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>MFA bolsters cybersecurity by providing additional layers of protection against unauthorised\u2002access. Even when one\u2002factor, like a password, is compromised, the extra factors protect against attackers accessing systems or accounts. For instance, a user may need to provide a temporary code sent to their phone or verify their\u2002identity through a fingerprint scan. MFA also safeguards\u2002users against phishing, brute-force attacks, and credential theft. MFA dramatically decreases the risk of data breaches by making it significantly harder for cybercriminals to circumvent security measures; it strengthens an organisation\u2019s overall\u2002cybersecurity posture.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"k20a\"><button class=\"w-tabs-section-header\" aria-controls=\"content-k20a\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">How can organisations implement MFA effectively?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-k20a\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>A strategic approach, however,\u2002enables organisations to implement MFA efficiently. Begin by assessing security needs to determine what security measures need to be\u2002in place. Select authentication methods\u2002that consider security and user convenience, like biometric scans or app-based one-time passwords. Roll MFA out in phases, deploying to sensitive applications first, and train users to\u2002guarantee adoption. By\u2002testing the system in controlled scenarios, the teams can identify issues that must be addressed before deployment. By regularly reviewing and adapting MFA\u2002strategies to include emerging methodologies in identity verification, the system continues to be able to defend against evolving cyber threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"b3b7\"><button class=\"w-tabs-section-header\" aria-controls=\"content-b3b7\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">What are the challenges of implementing MFA, and how can they be addressed?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-b3b7\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>User resistance is a\u2002known challenge of implementing MFA because of the perceived inconvenience. This can be alleviated by choosing\u2002authenticators that are easier to use, like push notifications or biometric scans. So, compatibility with legacy systems can also be challenging, as upgrades\u2002or additional integration efforts might be needed. Organisations can\u2002determine and rectify such gaps through a detailed infrastructure assessment. While deploying MFA enterprise-wide can be cost-prohibitive, deploying based on risk priority, starting with critical systems and then rolling out\u2002slowly, is also an option. These challenges will be overcome through clear communication and training as\u2002organisations adopt MFA successfully.<\/p>\n<\/div><\/div><\/div><\/div><\/div><div class=\"w-tabs-section\" id=\"i53e\"><button class=\"w-tabs-section-header\" aria-controls=\"content-i53e\" aria-expanded=\"false\"><div class=\"w-tabs-section-title\">Why should MFA be a mandatory part of a cybersecurity strategy?<\/div><div class=\"w-tabs-section-control\"><\/div><\/button><div  class=\"w-tabs-section-content\" id=\"content-i53e\"><div class=\"w-tabs-section-content-h i-cf\"><div class=\"wpb_text_column\"><div class=\"wpb_wrapper\"><p>Everyone should enable MFA, as it can provide an essential layer of defence against the most common cyber threats, such as phishing, credential theft, and brute-force attacks. As cybercriminals have grown more sophisticated, password-based access control\u2002is no longer adequate to protect sensitive systems and data. MFA\u2002provides an additional step in the authentication process, ensuring that attackers cannot gain access even if one factor has been leaked or compromised. It additionally promotes regulatory\u2002compliance and improves customer and stakeholder trust by illustrating a dedication to safeguarding digital assets. Implementing MFA as a staple in cybersecurity strategy dramatically enhances an organisation\u2019s readiness to defend against\u2002changing threats.<\/p>\n<\/div><\/div><\/div><\/div><\/div><\/div><\/div><div class=\"w-separator size_medium\"><\/div><\/div><\/div><div class=\"wpb_column vc_column_container\"><div class=\"vc_column-inner\"><div class=\"w-btn-wrapper align_justify\"><a class=\"w-btn us-btn-style_2\" href=\"#enquiry\"><span class=\"w-btn-label\">Enquire Today<\/span><\/a><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Blog Categories<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/blog\/content-marketing\/\">Content Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/digital-marketing\/\">Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/cyber-security-blog\/\">Cyber Security<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/blog\/graphic-design-blog\/\">Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/blog\/public-relations\/\">Public Relations<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/blog\/seo\/\">SEO<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/social-media-marketing\/\">Social Media Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/blog\/web-design-blog\/\">Web Design<\/a><\/li>\n<\/ul>\n<\/div><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">You might also like<\/span><\/span><\/h3><div class=\"w-html\"><ul><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/social-media-marketing-blog\/zero-moment-of-truth-benefit-social-media-marketing\/\" rel=\"bookmark\">Use the Zero Moment of Truth to Benefit your Social Media Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/your-complete-guide-to-ppc-marketing-basic\/\" rel=\"bookmark\">Your Complete Guide to PPC Marketing Basics. Find out more.<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/blog\/you-can-convey-a-lot-of-meaning-with-just-one-graphic\/\" rel=\"bookmark\">You Can Convey a Lot Of Meaning With Just One Graphic<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/digital-marketing-blog\/would-you-make-a-great-marketing-manager\/\" rel=\"bookmark\">Would you make a great marketing manager?<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-with-bona-magazine-and-the-digital-school-of-marketing\/\" rel=\"bookmark\">Win with Bona Magazine and the Digital School of Marketing<\/a><\/li><li><a href=\"https:\/\/digitalschoolofmarketing.co.za\/in-the-press\/win-a-digital-marketing-course-valued-at-r12-000\/\" rel=\"bookmark\">Win a Digital Marketing Course Valued at  R12 000<\/a><\/li><\/ul><\/div><div class=\"w-separator size_medium\"><\/div><h3 class=\"w-text us_custom_6caa4608 has_text_color\"><span class=\"w-text-h\"><span class=\"w-text-value\">Top Selling COurses<\/span><\/span><\/h3><div class=\"wpb_text_column us_custom_5cd26a65\"><div class=\"wpb_wrapper\"><ul>\n<li class=\"cat-item cat-item-1\"><a href=\"\/courses\/digital-marketing-course\/\">Intermediate Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-2\"><a href=\"\/courses\/advanced-digital-marketing-course\/\">Advanced Digital Marketing<\/a><\/li>\n<li class=\"cat-item cat-item-3\"><a href=\"\/courses\/social-media-marketing-course\/\">Intermediate Social media marketing<\/a><\/li>\n<li class=\"cat-item cat-item-4\"><a href=\"\/courses\/digital-brand-management-course\/\">Brand Management<\/a><\/li>\n<li class=\"cat-item cat-item-5\"><a href=\"\/courses\/graphic-design-course\/\">Basic Graphic Design<\/a><\/li>\n<li class=\"cat-item cat-item-6\"><a href=\"\/courses\/advanced-graphic-design-course\/\">Advanced Graphic design<\/a><\/li>\n<li class=\"cat-item cat-item-7\"><a href=\"\/courses\/national-certificate-of-advertising\/\">National Certificate of Advertising<\/a><\/li>\n<li class=\"cat-item cat-item-8\"><a href=\"\/courses\/national-diploma-of-copywriting-course\/\">National Diploma of Copyrighting<\/a><\/li>\n<\/ul>\n<\/div><\/div>\n<\/div><\/div><\/div><\/div><\/section>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":950,"featured_media":22419,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[771],"tags":[],"class_list":["post-22415","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cyber-security-blog"],"acf":[],"_links":{"self":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/22415","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/users\/950"}],"replies":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/comments?post=22415"}],"version-history":[{"count":0,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/posts\/22415\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media\/22419"}],"wp:attachment":[{"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/media?parent=22415"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/categories?post=22415"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/digitalschoolofmarketing.co.za\/wp-json\/wp\/v2\/tags?post=22415"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}