{"id":43492,"date":"2022-01-14T16:35:41","date_gmt":"2022-01-14T08:35:41","guid":{"rendered":"https:\/\/version-2.com\/?p=43492"},"modified":"2022-02-09T15:15:49","modified_gmt":"2022-02-09T07:15:49","slug":"multifactor-authentication-how-to-benefit-from-this-security-strategy","status":"publish","type":"post","link":"https:\/\/version-2.com\/en\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/","title":{"rendered":"Multifactor Authentication: How to benefit from this security strategy"},"content":{"rendered":"<div data-elementor-type=\"wp-post\" data-elementor-id=\"43492\" class=\"elementor elementor-43492\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e post-content elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg\" alt=\"\" width=\"958\" height=\"auto\"><\/p>\n\n<p><b><i>Multi-factor authentication<\/i><\/b><i><span style=\"font-weight:400;\"> is a technological solution that aims to inhibit cyberattacks. In practice, this security strategy uses at least two types of mechanisms to identify an individual trying to access a certain system online.<\/span><\/i><\/p> <p><i><span style=\"font-weight:400;\">The methods can involve knowledge factors, such as passwords; possession factors, such as totems; or inheritance factors, including fingerprint and facial recognition.<\/span><\/i><\/p> <p><i><span style=\"font-weight:400;\">Do you want to learn more about it? Keep reading the article we have prepared.<\/span><\/i><\/p> <p><i><span style=\"font-weight:400;\"><\/span><\/i><\/p> <p><b>Multi-factor authentication<\/b><span style=\"font-weight:400;\"> is an intelligent solution that protects from cyberattacks to individuals and businesses.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">This strategy is especially important these days, considering the significant increase in hacking attempts.<\/span><\/p> <p><span style=\"font-weight:400;\">A survey done by Kaspersky, an organization specializing in security, and published on CNN Brasil\u2018s website, points to alarming numbers. According to the survey, in 2020, there was a 330% increase in cyberattack attempts. Altogether, more than 370 million corporate systems were hacked.<\/span><\/p> <p><span style=\"font-weight:400;\">With the adoption of remote work by most companies during the covid-19 pandemic, their systems became more vulnerable to hacking.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">This has increased the need for technologies such as <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\">, as discussed in one of the topics below.<\/span><\/p> <p><span style=\"font-weight:400;\">In this article, we explain what this feature is, its importance, and how to implement it, among other information. To make it easier for you to understand, it is divided into the following topics:<\/span><i><span style=\"font-weight:400;\"><b><\/b><\/span><\/i><\/p> <ul> <li aria-level=\"1\"><b>What is Multi-factor Authentication?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>How Important is Multi-factor Authentication?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Are Companies Required to Use This Feature?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Two-factor Authentication and Multi-factor Authentication: What is the Difference?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Are Complex Passwords as Effective as MFA?<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Digital Authentication Types<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Methods Used in Attempts to Break MFA Security<\/b><\/li> <\/ul> <ul> <li aria-level=\"1\"><b>Multi-factor Authentication and Remote Work<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">Keep reading and enjoy it!<\/span><\/p>\n\n<ul> <li aria-level=\"1\"><b>What is Multi-factor Authentication?<\/b><\/li> <\/ul> <p><b>Multi-factor Authentication<\/b><span style=\"font-weight:400;\"> (MFA) is a feature that inhibits attackers by putting together different mechanisms for user authentication. In this way, it guarantees the required security for data that could be accessed by the computing device, avoiding countless inconveniences and losses.<\/span><\/p> <p><span style=\"font-weight:400;\">In practice, there must be a unique User ID that complies with PCI DSS Requirement 8.1.1, in addition to at least two of the three criteria outlined in PCI DSS Requirement 8.2. These are:<\/span><\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Knowledge factor<\/span><span style=\"font-weight:400;\">: something the user knows, such as a password;<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Possession factor<\/span><span style=\"font-weight:400;\">: something they own, such as a token; and<\/span><\/li> <li style=\"font-weight:400;\" aria-level=\"1\"><span style=\"font-weight:400;\">Inheritance factor<\/span><span style=\"font-weight:400;\">: something that relates to who they are, as in the case of biometrics.<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">For <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> to work as it should, the mechanisms must be independent of each other. That is, if one of the factors grants access to the other, the desired security will be compromised.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>How Important is Multi-factor Authentication?<\/b><\/li> <\/ul> <p><b>Multi-factor authentication <\/b><span style=\"font-weight:400;\">is a mechanism to combat<\/span> <span style=\"font-weight:400;\">data theft and cybercrime in general. For organizations, this protection is extremely important for several reasons.<\/span><\/p> <p><span style=\"font-weight:400;\">It helps to avoid financial losses through theft and impact on productivity, as this type of occurrence can halt business operations.<\/span><\/p> <p><span style=\"font-weight:400;\">In addition, it prevents the company from being exposed to legal proceedings arising from data leaks.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">This can occur, for example, by not complying with the General Data Protection Law (<\/span><a href=\"about:blank\"><span style=\"font-weight:400;\">LGPD<\/span><\/a><span style=\"font-weight:400;\">), which came into force on September 18th. This <\/span><a href=\"about:blank\"><span style=\"font-weight:400;\">law<\/span><\/a><span style=\"font-weight:400;\"> requires companies to adopt a series of procedures in order to protect individual data.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">Failure to comply with the law can lead to administrative sanctions with eight different types of punishment, which include fines of up to R$50 million.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Are Companies Required to Use This Feature?<\/b><\/li> <\/ul> <p><b>Multi-factor authentication <\/b><span style=\"font-weight:400;\">is not a mandatory solution for all companies. However, its use is strongly advised for companies of any size or segment, after all, it combats a series of risks.<\/span><\/p> <p><span style=\"font-weight:400;\">Also, individuals can benefit from this feature as they are also targeted by malicious actions such as cyberattacks.<\/span><\/p> <p><span style=\"font-weight:400;\">For some audits, however, it is already a must, and it may no longer be optional in different contexts soon.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Two-factor Authentication and Multi-factor Authentication: What is the Difference?<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">Like <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\">, two-factor authentication (2FA) is intended to make it more difficult to <\/span><i><span style=\"font-weight:400;\">hack<\/span><\/i><span style=\"font-weight:400;\"> an individual or legal entity\u2019s accounts. Both require the user to use more than just a traditional password to log in.<\/span><\/p> <p><span style=\"font-weight:400;\">The difference is that in two-factor authentication, the same method can be used more than once, such as a password and a security code, two factors of knowledge.<\/span><\/p> <p><b>Multi-factor authentication<\/b><span style=\"font-weight:400;\"> is a more complex system, which requires at least two methods to allow access to a certain account. In practice, this means the individual will have to combine elements such as a password and the fingerprint scan. Note that we are talking, respectively, of a knowledge factor and an inheritance factor.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Are Complex Passwords as Effective as MFA?<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">Experts recommend using <\/span><b>multi-factor authentication <\/b><span style=\"font-weight:400;\">whenever a service provider offers this mechanism.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">That is because the MFA makes it possible to block 99.9% of automated bot attacks, and studies show its effectiveness in stopping malicious actions.&nbsp;<\/span><\/p> <p><span style=\"font-weight:400;\">According to Google, simply linking a phone number to the Google account as a way to recover passwords makes it possible to block up to 100% of automated bots, 99% of mass phishing attacks, and 66% of targeted attacks.<\/span><\/p> <p><span style=\"font-weight:400;\">Using only a password as a security mechanism is already an inefficient action, however complex it can be, as hackers have access to increasingly sophisticated cyber tools and the number of breached accounts is shocking.<\/span><\/p> <p><span style=\"font-weight:400;\">In contrast, using <\/span><b>multi-factor authentication <\/b><span style=\"font-weight:400;\">inhibits these intrusions because, in addition to the password, it is necessary to use an additional authentication method.<\/span><\/p> <p><span style=\"font-weight:400;\">Furthermore, compromising MFA tokens is so expensive that it only generates interest in hackers who wish to gain access to exorbitant amounts.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Digital Authentication Types<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">There are numerous efficient ways to stop malicious online actions through digital authentication with different levels of complexity. In this topic, we cover the best known. Check them out:<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Passwords: <\/b><span style=\"font-weight:400;\">Passwords are the most common authentication mode.<\/span> <span style=\"font-weight:400;\">In order to fulfill their function and provide security, some services require compliance with criteria such as the minimum number of characters and the use of numbers or special characters.<\/span><\/li> <\/ul> <p><b><\/b><br><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Personal Information: <\/b><span style=\"font-weight:400;\">Certain systems may request information from the user, such as the mother\u2019s name, date or city of birth, and full name.<\/span><\/li> <\/ul> <p><b><\/b><br><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>PIN: <\/b><span style=\"font-weight:400;\">this is a code generated to identify the user of a website, for example. As mentioned earlier, this information is sent to a specific smartphone.<\/span><\/li> <\/ul> <p><b><\/b><br><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Token: <\/b><span style=\"font-weight:400;\">&nbsp;As a possession factor, the token is an item widely used by banks to generate passwords and prevent fraud. This method has the disadvantage of allowing shared access, which can reduce security, especially if not combined with another authentication mode.<\/span><\/li> <\/ul> <p><b><\/b><br><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Face Recognition: <\/b><span style=\"font-weight:400;\">This highly advanced form of authentication can identify a person\u2019s face through algorithms and software. First, the features are detected by a camera. Then, sizes, formats, proportions, and distances are analyzed.&nbsp;<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">All this information is stored in a database and used for identification.<\/span><\/p> <p><span style=\"font-weight:400;\">You might be asking yourself: what about when we get older or present ourselves with a different angle and lighting? In reality, this technology, which was limited before, has evolved more and more, and recognition in three dimensions is now possible.<\/span><\/p> <p><span style=\"font-weight:400;\">In addition, the camera captures the shape of the user\u2019s head, precisely to identify their features, regardless of the angle they are at.<\/span><\/p> <p>&nbsp;<\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><b>Voice Recognition:<\/b><span style=\"font-weight:400;\"> There are certain applications to identify users\u2019 voices. Audios are split into bits, converted into digital format, and transformed into text.<\/span><\/li> <\/ul> <p><span style=\"font-weight:400;\">Voice recognition fulfills its purpose by analyzing intonation, pronunciation, and vocabulary, among other characteristics of the user\u2019s speech. Its weakness lies in contemplating accents and changes in voice tone, for example.<\/span><\/p> <p>&nbsp;<\/p> <ul> <li style=\"font-weight:400;\" aria-level=\"1\"><b>Fingerprint:<\/b><span style=\"font-weight:400;\"> This form of authentication is very common among inheritance factors. It consists of the unique pattern each person has at their fingertips and can differentiate them from others.<\/span><\/li> <\/ul> <p>&nbsp;<\/p> <p><span style=\"font-weight:400;\">No type of digital authentication is 100% secure if applied alone. For this reason, <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> is strongly recommended.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Methods Used in Attempts to Break MFA Security<\/b><\/li> <\/ul> <p><b>Multi-factor authentication <\/b><span style=\"font-weight:400;\">is widely used by companies to prevent attacks. However, not even this mechanism, with all its complexity and effectiveness, guarantees 100% protection. Here are some methods used by hackers to breach your security:<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Disabling the MFA<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">Malicious users can change settings in order to disable the <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> application. That way, they do not need to go through a second authentication step when connecting.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Bypassing Multi-factor Authentication<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">In this case, the hacker applies techniques that allow access without MFA. They can do this in two ways: by controlling a maliciously downloaded, user-authenticated application, or by taking advantage of some <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> vulnerability.<\/span><\/p> <p><span style=\"font-weight:400;\">The possibility of intercepting an SMS message with the authentication code is an example.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Taking Advantage of Authorized MFA Exceptions<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">This happens when the malicious agent finds accounts operating without the MFA\u2019s criteria. They take advantage of legacy applications that do not provide this protection mechanism. This is the case with POP\/SMTP email servers.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Stealing SAML Signing Certificate<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">This technique is well known and very difficult to detect. It consists of stealing the private key or having a forged key for signing certificates and shows how important it is to have constant monitoring.&nbsp;<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Reusing a Session<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">It is possible to compromise a system with an authenticated session because most MFA features default to a 30-day timeframe to require re-authentication of a user, system, or application. This leaves enough time to access an account.<\/span><\/p> <p><b><\/b><\/p> <ul> <li aria-level=\"1\"><b>Multi-factor Authentication and Remote Work<\/b><\/li> <\/ul> <p><span style=\"font-weight:400;\">The use of <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> has become more urgent with the covid-19 pandemic. This is because most organizations had to adapt to a <\/span><a href=\"about:blank\"><span style=\"font-weight:400;\">home office<\/span><\/a><span style=\"font-weight:400;\"> mode, with employees accessing the systems from any environment and device.<\/span><\/p> <p><span style=\"font-weight:400;\">According to <\/span><a href=\"about:blank\"><span style=\"font-weight:400;\">this publication<\/span><\/a><span style=\"font-weight:400;\">, 90% of companies operating in Brazil have adopted remote work due to covid-19. Also, many will maintain this working mode even after the end of the pandemic.<\/span><\/p> <p><span style=\"font-weight:400;\">This new condition brought vulnerability to companies, as it facilitated the actions of malicious individuals.<\/span><\/p> <p><span style=\"font-weight:400;\">In this article, you have seen what <\/span><b>multi-factor authentication<\/b><span style=\"font-weight:400;\"> is and its importance to individuals and corporations. If our content has answered your questions, please share it with others who are also interested in the subject.<\/span><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>","protected":false},"excerpt":{"rendered":"<p>Multi-factor authentication is a technological solution [&hellip;]<\/p>","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-43492","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Multifactor Authentication: How to benefit from this security strategy - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/version-2.com\/en\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Multifactor Authentication: How to benefit from this security strategy - Version 2\" \/>\n<meta property=\"og:description\" content=\"Multi-factor authentication is a technological solution [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/version-2.com\/en\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-01-14T08:35:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-02-09T07:15:49+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Multifactor Authentication: How to benefit from this security strategy\",\"datePublished\":\"2022-01-14T08:35:41+00:00\",\"dateModified\":\"2022-02-09T07:15:49+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/\"},\"wordCount\":1667,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Multi-factor-authentication.jpg\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/\",\"url\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/\",\"name\":\"Multifactor Authentication: How to benefit from this security strategy - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Multi-factor-authentication.jpg\",\"datePublished\":\"2022-01-14T08:35:41+00:00\",\"dateModified\":\"2022-02-09T07:15:49+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Multi-factor-authentication.jpg\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-1b21798\\\/wp-content\\\/uploads\\\/2022\\\/01\\\/Multi-factor-authentication.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/01\\\/multifactor-authentication-how-to-benefit-from-this-security-strategy\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Multifactor Authentication: How to benefit from this security strategy\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/en\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Multifactor Authentication: How to benefit from this security strategy - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/version-2.com\/en\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/","og_locale":"en_US","og_type":"article","og_title":"Multifactor Authentication: How to benefit from this security strategy - Version 2","og_description":"Multi-factor authentication is a technological solution [&hellip;]","og_url":"https:\/\/version-2.com\/en\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/","og_site_name":"Version 2","article_published_time":"2022-01-14T08:35:41+00:00","article_modified_time":"2022-02-09T07:15:49+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"Written by":"version2hk","Est. reading time":"8 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Multifactor Authentication: How to benefit from this security strategy","datePublished":"2022-01-14T08:35:41+00:00","dateModified":"2022-02-09T07:15:49+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/"},"wordCount":1667,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/","url":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/","name":"Multifactor Authentication: How to benefit from this security strategy - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#primaryimage"},"image":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg","datePublished":"2022-01-14T08:35:41+00:00","dateModified":"2022-02-09T07:15:49+00:00","breadcrumb":{"@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-1b21798\/wp-content\/uploads\/2022\/01\/Multi-factor-authentication.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/version-2.com\/2022\/01\/multifactor-authentication-how-to-benefit-from-this-security-strategy\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Multifactor Authentication: How to benefit from this security strategy"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/en\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-bju","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43492","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/comments?post=43492"}],"version-history":[{"count":10,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43492\/revisions"}],"predecessor-version":[{"id":43507,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/posts\/43492\/revisions\/43507"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/media?parent=43492"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/categories?post=43492"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/en\/wp-json\/wp\/v2\/tags?post=43492"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}