{"id":398,"date":"2020-06-18T15:03:12","date_gmt":"2020-06-18T15:03:12","guid":{"rendered":"https:\/\/www.discoveroasis.com\/ediscovery-unredacted\/?p=398"},"modified":"2021-03-24T15:00:05","modified_gmt":"2021-03-24T15:00:05","slug":"how-to-provide-maximum-security-for-remote-users","status":"publish","type":"post","link":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/","title":{"rendered":"How to Provide Maximum Security for Remote Users"},"content":{"rendered":"\n<h2>Our tech and security experts weigh in on how to fully secure a remote user\u2019s environment <\/h2>\n\n\n\n<p>This year has, thus far, tested the bricks in the foundation of many organizations in our industry. Unimaginable security breaches caused by advanced ransomware, plus the onset of global remote working (which may not be temporary), has many asking, \u201care there gaps in our security policies and structure?\u201d <\/p>\n\n\n\n<p>It&#8217;s important to know what steps to take inside and outside of your technology to fully secure users. At Oasis, we take preventive steps to make sure our client\u2019s data is kept safe and secure; this includes everything from the application layer all the way through to network security and hardware configuration. With that in mind, we asked some of our team members to give recommendations on these, specifically for remote user security. All of their knowledge has been combined below to provide you with an expert\u2019s well-rounded set of usable recommendations. <\/p>\n\n\n\n<h3>Application Security<\/h3>\n\n\n\n<p>At Oasis we host and manage a Suite of Technology, with\nthe primary and most frequently accessed application being <a href=\"https:\/\/www.discoveroasis.com\/platform.html#relativity\">Relativity<\/a>. Each application has built-in\nsecurity options that can be adjusted to increase the level of security per\nuser. Our team recommends enabling the following:<\/p>\n\n\n\n<ul><li>Computer-specific\nIP address identification<\/li><li>Multifactor\nauthentication (MFA)<\/li><li>Complex\npassword creation options for user account setup<\/li><\/ul>\n\n\n\n<p>We also require users to log in through a secure VPN like Citrix or <a href=\"https:\/\/searchwindowsserver.techtarget.com\/definition\/Microsoft-Remote-Desktop-Web-Access-Microsoft-RD-Web-Access\">Microsoft RD Web<\/a> (also with MFA) before they can access any applications within our private environment. This provides additional security and control over your user population.<\/p>\n\n\n\n<p>It\u2019s crucial to know what security features are available within each application you\u2019re using and ensure you have armed users with all the necessary information and tools for maintaining their security within those applications. That includes having the latest antivirus, reminding them of software updates, and educating them on security risks.<\/p>\n\n\n\n<h3>Network Security<\/h3>\n\n\n\n<p>At this point, it\u2019s likely you\u2019re aware of the network settings needed to safeguard your environment security. For optimizing user-level security, we highly recommend using secure VPN access points to establish an encrypted connection that safely transmits data and prevents unauthorized users from listening to activity. <\/p>\n\n\n\n<p>Remote\nmachines may also be set up to limit functionality, such as copying files and text\nto home machines, or barring access to services like Dropbox or Google Drive,\nwhich would allow users to upload and access files outside of the work machine.\nConsider the business need for the remote machine and build it to those exact\nspecifications\u2013\u2013if there is no need to access certain services, the security to\nblock them should be in place. If you don\u2019t choose this method, you could take\na network inventory to see which unnecessary applications are running and shut\nthem down. Here are some other tips for network security:<\/p>\n\n\n\n<ul><li>Create\na weekly routine for checking that all devices are fully patched with the\nlatest operating systems, antivirus\/antimalware, and deploy all necessary\nupdates regularly. <\/li><li>Carry out penetration testing to find and\nfix vulnerabilities. <\/li><li>Require the use of a password utility\nsuch as <a href=\"https:\/\/www.lastpass.com\/get-premium\">Lastpass<\/a> or <a href=\"https:\/\/1password.com\/\">1Password<\/a> to make sure\npasswords are strong, &nbsp;unique, and not\neasy to crack.<\/li><li>Give safety recommendations to remote users\nregarding their home internet:<ul><li>Change the default administrator password\nand settings on your home router.<\/li><\/ul><ul><li>Require a password to access your Wi-Fi\nand encrypt using WPA2 to prevent hackers from simply capturing your data.<\/li><\/ul><ul><li>Create separate Wi-Fi networks\u2013\u2013one for\nfamily and visitors and one for work to separate all internet activity. <\/li><\/ul><\/li><\/ul>\n\n\n\n<h3><strong>Secure Hardware Configuration<\/strong><\/h3>\n\n\n\n<ul><li>Provide hardware that is suitable and\ncapable of delivering your requirements.<\/li><li>Everything must be encrypted everywhere,\nthen encrypted again. Ask yourself, \u2018did I actually provide the tool or\noperating system to achieve the security requirements?\u2019<\/li><li>Have policies in place for removable\nmedia use. It\u2019s not safe for users to plug in personal or found USB drives,\nphones, etc., so be sure to have a policy that doesn\u2019t allow users to plug them\nin. Set up an alert system to notify you if an unauthorized device is\nrecognized in the system.<\/li><li>Consider providing hardware with\nbiometrics such as fingerprint scanning or facial recognition.<\/li><\/ul>\n\n\n\n<h3>Providing Security Education<\/h3>\n\n\n\n<ul><li>Educate your team on physical securities,\ndata classification, incident reporting, and acceptable use. This could prevent\na security incident. Oasis uses <a href=\"https:\/\/www.knowbe4.com\/\">KnowBe4<\/a> to train users on\nphishing and security awareness through games and a Netflix-like video series\n(our team actually <em>enjoys<\/em> this training program). <\/li><li>Provide remote work environment\neducation:<ul><li>Work from private spaces and make sure\nlaptop screens are never visible to others.<\/li><\/ul><ul><li>Maintain privacy while on conference calls.\n<\/li><\/ul><ul><li>Don\u2019t let friends or family use your work\ndevices.<\/li><\/ul><ul><li>Secure devices when not in use.<\/li><\/ul><\/li><li>Constantly educate yourself by receiving\nthe latest security training and certifications available.<\/li><\/ul>\n\n\n\n<p>Ensuring accurate software, hardware, and network security aspects are in place will give you confidence in the foundation of your security. It\u2019s a constant effort to provide proper training, hardware, network, and application security\u2013\u2013all of which may take extra effort with remote users. However, you\u2019ll be providing your team with a defense in depth approach that limits vulnerabilities, reduces the chance of a security incident, and increases the strength of your organization\u2019s overall security. If you have questions about the suggestions in this article or would like to learn more about Oasis\u2019 information security, <a href=\"https:\/\/www.discoveroasis.com\/iaas.html\">cloud security<\/a>, or secure data centers, contact us at <a href=\"mailto:info@oasisdiscovery.com\">info@oasisdiscovery.com<\/a>.<\/p>\n\n\n\n<p><strong>Security recommendations provided by:<\/strong><br>Jeremy Cheatham, Senior Systems Engineer<br>Tat Chunnui, Technology Services Manager<br>Brian Clark, Senior Systems Engineer<br>Jacob Dababneh, VP of Technology Services &amp; Co-Founder<br>Jarrod Kimmel, Director of Technical Services<br>Matt King, Senior Solutions Engineer<br>Matt Kingdon, Information Security Director<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year has, thus far, tested the bricks in the foundation of many organizations in our industry. Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users. <\/p>\n","protected":false},"author":2,"featured_media":404,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":""},"categories":[4],"tags":[7,20,9,47,17],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v20.11 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Provide Maximum Security for Remote Users | Oasis Blog Security<\/title>\n<meta name=\"description\" content=\"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Provide Maximum Security for Remote Users | Oasis Blog Security\" \/>\n<meta property=\"og:description\" content=\"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\" \/>\n<meta property=\"og:site_name\" content=\"Oasis Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-18T15:03:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-24T15:00:05+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/06\/remote-security-vpn.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"576\" \/>\n\t<meta property=\"og:image:height\" content=\"471\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Oasis Discovery\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Oasis Discovery\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\"},\"author\":{\"name\":\"Oasis Discovery\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/6ad672109da7d89fea903f4266ca8346\"},\"headline\":\"How to Provide Maximum Security for Remote Users\",\"datePublished\":\"2020-06-18T15:03:12+00:00\",\"dateModified\":\"2021-03-24T15:00:05+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\"},\"wordCount\":950,\"publisher\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization\"},\"keywords\":[\"eDiscovery\",\"IaaS\",\"Legal Technology\",\"SaaS\",\"Security\"],\"articleSection\":[\"Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\",\"url\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\",\"name\":\"How to Provide Maximum Security for Remote Users | Oasis Blog Security\",\"isPartOf\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#website\"},\"datePublished\":\"2020-06-18T15:03:12+00:00\",\"dateModified\":\"2021-03-24T15:00:05+00:00\",\"description\":\"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Provide Maximum Security for Remote Users\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#website\",\"url\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/\",\"name\":\"Oasis Blog\",\"description\":\"eDiscovery, Cloud, and Legal Technology News from Oasis\",\"publisher\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization\",\"name\":\"Oasis Discovery\",\"url\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/04\/Oasis_Gradient_Blue_RGB.png\",\"contentUrl\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/04\/Oasis_Gradient_Blue_RGB.png\",\"width\":500,\"height\":205,\"caption\":\"Oasis Discovery\"},\"image\":{\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/oasis-discovery\",\"https:\/\/www.youtube.com\/channel\/UC3abuFo4hTfsGEdGqDzQiGA\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/6ad672109da7d89fea903f4266ca8346\",\"name\":\"Oasis Discovery\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/7fcd9dd8dd99cab0a4fb38f67b48d95a?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/7fcd9dd8dd99cab0a4fb38f67b48d95a?s=96&d=mm&r=g\",\"caption\":\"Oasis Discovery\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How to Provide Maximum Security for Remote Users | Oasis Blog Security","description":"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/","og_locale":"en_US","og_type":"article","og_title":"How to Provide Maximum Security for Remote Users | Oasis Blog Security","og_description":"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.","og_url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/","og_site_name":"Oasis Blog","article_published_time":"2020-06-18T15:03:12+00:00","article_modified_time":"2021-03-24T15:00:05+00:00","og_image":[{"width":576,"height":471,"url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/06\/remote-security-vpn.jpg","type":"image\/jpeg"}],"author":"Oasis Discovery","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Oasis Discovery","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#article","isPartOf":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/"},"author":{"name":"Oasis Discovery","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/6ad672109da7d89fea903f4266ca8346"},"headline":"How to Provide Maximum Security for Remote Users","datePublished":"2020-06-18T15:03:12+00:00","dateModified":"2021-03-24T15:00:05+00:00","mainEntityOfPage":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/"},"wordCount":950,"publisher":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization"},"keywords":["eDiscovery","IaaS","Legal Technology","SaaS","Security"],"articleSection":["Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/","url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/","name":"How to Provide Maximum Security for Remote Users | Oasis Blog Security","isPartOf":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#website"},"datePublished":"2020-06-18T15:03:12+00:00","dateModified":"2021-03-24T15:00:05+00:00","description":"Our tech and security experts weigh in on the most important steps to take inside and outside of your technology to fully secure remote users.","breadcrumb":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/security\/how-to-provide-maximum-security-for-remote-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/"},{"@type":"ListItem","position":2,"name":"How to Provide Maximum Security for Remote Users"}]},{"@type":"WebSite","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#website","url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/","name":"Oasis Blog","description":"eDiscovery, Cloud, and Legal Technology News from Oasis","publisher":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#organization","name":"Oasis Discovery","url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/logo\/image\/","url":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/04\/Oasis_Gradient_Blue_RGB.png","contentUrl":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-content\/uploads\/2020\/04\/Oasis_Gradient_Blue_RGB.png","width":500,"height":205,"caption":"Oasis Discovery"},"image":{"@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.linkedin.com\/company\/oasis-discovery","https:\/\/www.youtube.com\/channel\/UC3abuFo4hTfsGEdGqDzQiGA"]},{"@type":"Person","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/6ad672109da7d89fea903f4266ca8346","name":"Oasis Discovery","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/7fcd9dd8dd99cab0a4fb38f67b48d95a?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/7fcd9dd8dd99cab0a4fb38f67b48d95a?s=96&d=mm&r=g","caption":"Oasis Discovery"}}]}},"_links":{"self":[{"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/posts\/398"}],"collection":[{"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/comments?post=398"}],"version-history":[{"count":5,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/posts\/398\/revisions"}],"predecessor-version":[{"id":403,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/posts\/398\/revisions\/403"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/media\/404"}],"wp:attachment":[{"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/media?parent=398"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/categories?post=398"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.oasisdiscovery.com\/ediscovery-unredacted\/wp-json\/wp\/v2\/tags?post=398"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}