{"id":10034,"date":"2016-08-06T12:40:12","date_gmt":"2016-08-06T12:40:12","guid":{"rendered":"https:\/\/vboxxcloud.nl\/?p=10034"},"modified":"2018-03-21T15:14:10","modified_gmt":"2018-03-21T14:14:10","slug":"7-top-cloud-computing-threats","status":"publish","type":"post","link":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/","title":{"rendered":"7 Top Cloud Computing Threats"},"content":{"rendered":"<p><span style=\"color: #000000;\">A recent report from the<\/span> <a href=\"https:\/\/cloudsecurityalliance.org\/\" target=\"_blank\" rel=\"nofollow noopener\">Cloud Security Alliance<\/a> <span style=\"color: #000000;\">identified the biggest threats to Cloud Computing. Today we highlight some of them while identifying vBoxxCloud features that help prevent these threats.\u00a0<\/span><\/p>\n<p><!--more--><\/p>\n<h3><span style=\"color: #000000;\"><strong>1. Data Breaches<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">Data Breaches are not unique to Cloud Computing. However, \u00a0it\u2019s one of the main concerns for Cloud adopters. A data breach could be either targeted or consequence of human error. It is important to have a solid organizational structure in the Cloud, in order to minimize the risk of loosing data. In vBoxxCloud you can also set permission policies that will help you control who and how users access the folders.<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>2. Weak Identity, Credential and Access Management<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">According to the report, data breaches often happen due to insufficient authentication mechanisms or weak password use. Setting up a two-step authentication system would solve the issue.\u00a0Consequently users will always have to use a second device to login.<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>3. Insecure Interfaces<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">Many Cloud providers use programming interfaces, allowing users to manage the Cloud effectively. The report defends that \u201cthese interfaces must be designed to protect against both accidental and malicious attempts\u201d. Rigorous penetration testing is essential, to guarantee user security within the Cloud. vBoxxCloud recently conducted a penetration test that had positive results.\u00a0<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>4. System and Application Vulnerabilities<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">An issue that exists,\u00a0since computers were invented. Frequent updates are extremely important, in order to prevent\u00a0any system vulnerability. We are constantly updating our service, you can follow any updates on vBoxxCloud <a href=\"https:\/\/cp.vboxx.nl\/?\/news\/\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>.<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>5. Account Hijacking<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">There are several steps you can take to prevent hijacking. vBoxxCloud, allows you to create a hierarchical structure that effectively bars any access to higher organizations. On top of this an\u00a0admin can keep track of any strange activity in the Cloud. Two Step authentication reduces the risk of account hijacking.<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>6. Malicious Insiders<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">You might find yourself in a situation where a former employee has intentionally misused the access\u00a0to the Cloud. This could leave your organization vulnerable. \u00a0The solution would be remotely deleting the files as soon as the insider is identified.\u00a0<\/span><\/p>\n<h3><span style=\"color: #000000;\"><strong>7. Data Loss<\/strong><\/span><\/h3>\n<p><span style=\"color: #000000;\">Many factors could lead to data loss. All the points above are data loss liabilities. At vBoxx we know that your documents are important. In vBoxxCloud, you can keep the deleted files for a certain amount of time. \u00a0If you delete the files accidentally or the\u00a0local files get\u00a0corrupted you can always recover them.<\/span><\/p>\n<p><span style=\"color: #000000;\">Note: To read\u00a0the full report click <a href=\"https:\/\/cloudsecurityalliance.org\/download\/the-treacherous-twelve-cloud-computing-top-threats-in-2016\/\" target=\"_blank\" rel=\"nofollow noopener\">here<\/a>.<\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #000000;\"><strong>Ready to try a business grade Cloud service?<\/strong><\/span><\/p>\n<p style=\"text-align: center;\"><span style=\"color: #ff9900;\"><a style=\"color: #ff9900;\" href=\"https:\/\/vboxxcloud.com\/signup\" target=\"_blank\" rel=\"noopener\"><strong>Start a vBoxxCloud Trial Now!<\/strong><\/a><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. Today we highlight some of them while identifying vBoxxCloud features that help prevent these threats.\u00a0<\/p>\n","protected":false},"author":2,"featured_media":10037,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[],"class_list":["post-10034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-news"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>7 Top Cloud Computing Threats - vBoxxCloud Blog<\/title>\n<meta name=\"description\" content=\"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today&#039;s post we highlight the most dangerous.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"7 Top Cloud Computing Threats - vBoxxCloud Blog\" \/>\n<meta property=\"og:description\" content=\"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today&#039;s post we highlight the most dangerous.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"vBoxxCloud Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/vBoxxbv\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-08-06T12:40:12+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-21T14:14:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1920\" \/>\n\t<meta property=\"og:image:height\" content=\"1362\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"vBoxx Team\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@vboxx\" \/>\n<meta name=\"twitter:site\" content=\"@vboxx\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"vBoxx Team\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\"},\"author\":{\"name\":\"vBoxx Team\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55\"},\"headline\":\"7 Top Cloud Computing Threats\",\"datePublished\":\"2016-08-06T12:40:12+00:00\",\"dateModified\":\"2018-03-21T14:14:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\"},\"wordCount\":418,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg\",\"articleSection\":[\"News\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\",\"name\":\"7 Top Cloud Computing Threats - vBoxxCloud Blog\",\"isPartOf\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg\",\"datePublished\":\"2016-08-06T12:40:12+00:00\",\"dateModified\":\"2018-03-21T14:14:10+00:00\",\"description\":\"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today's post we highlight the most dangerous.\",\"breadcrumb\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg\",\"contentUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg\",\"width\":1920,\"height\":1362,\"caption\":\"Top Cloud Computing Threats\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/vboxxcloud.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"7 Top Cloud Computing Threats\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#website\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/\",\"name\":\"vBoxxCloud Blog\",\"description\":\"Follow our blog, for the latest vBoxxCloud updates and trends in technology.\",\"publisher\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/vboxxcloud.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#organization\",\"name\":\"vBoxxCloud\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png\",\"contentUrl\":\"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png\",\"width\":158,\"height\":41,\"caption\":\"vBoxxCloud\"},\"image\":{\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/vBoxxbv\/\",\"https:\/\/x.com\/vboxx\",\"https:\/\/www.instagram.com\/vboxx\/\",\"https:\/\/www.linkedin.com\/company\/vboxx-b-v-\",\"https:\/\/www.youtube.com\/channel\/UC-VmfbaWx3ggYr58qB4fXPQ\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55\",\"name\":\"vBoxx Team\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g\",\"caption\":\"vBoxx Team\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"7 Top Cloud Computing Threats - vBoxxCloud Blog","description":"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today's post we highlight the most dangerous.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/","og_locale":"en_US","og_type":"article","og_title":"7 Top Cloud Computing Threats - vBoxxCloud Blog","og_description":"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today's post we highlight the most dangerous.","og_url":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/","og_site_name":"vBoxxCloud Blog","article_publisher":"https:\/\/www.facebook.com\/vBoxxbv\/","article_published_time":"2016-08-06T12:40:12+00:00","article_modified_time":"2018-03-21T14:14:10+00:00","og_image":[{"width":1920,"height":1362,"url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg","type":"image\/jpeg"}],"author":"vBoxx Team","twitter_card":"summary_large_image","twitter_creator":"@vboxx","twitter_site":"@vboxx","twitter_misc":{"Written by":"vBoxx Team","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#article","isPartOf":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/"},"author":{"name":"vBoxx Team","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55"},"headline":"7 Top Cloud Computing Threats","datePublished":"2016-08-06T12:40:12+00:00","dateModified":"2018-03-21T14:14:10+00:00","mainEntityOfPage":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/"},"wordCount":418,"commentCount":0,"publisher":{"@id":"https:\/\/vboxxcloud.com\/blog\/#organization"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg","articleSection":["News"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/","url":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/","name":"7 Top Cloud Computing Threats - vBoxxCloud Blog","isPartOf":{"@id":"https:\/\/vboxxcloud.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg","datePublished":"2016-08-06T12:40:12+00:00","dateModified":"2018-03-21T14:14:10+00:00","description":"A recent report from the Cloud Security Alliance identified the biggest threats to Cloud Computing. In today's post we highlight the most dangerous.","breadcrumb":{"@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#primaryimage","url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg","contentUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2016\/08\/abstract-1278052_1920.jpg","width":1920,"height":1362,"caption":"Top Cloud Computing Threats"},{"@type":"BreadcrumbList","@id":"https:\/\/vboxxcloud.com\/blog\/7-top-cloud-computing-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/vboxxcloud.com\/blog\/"},{"@type":"ListItem","position":2,"name":"7 Top Cloud Computing Threats"}]},{"@type":"WebSite","@id":"https:\/\/vboxxcloud.com\/blog\/#website","url":"https:\/\/vboxxcloud.com\/blog\/","name":"vBoxxCloud Blog","description":"Follow our blog, for the latest vBoxxCloud updates and trends in technology.","publisher":{"@id":"https:\/\/vboxxcloud.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/vboxxcloud.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/vboxxcloud.com\/blog\/#organization","name":"vBoxxCloud","url":"https:\/\/vboxxcloud.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png","contentUrl":"https:\/\/vboxxcloud.com\/blog\/wp-content\/uploads\/2017\/08\/vboxxcloud-logo-1.png","width":158,"height":41,"caption":"vBoxxCloud"},"image":{"@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/vBoxxbv\/","https:\/\/x.com\/vboxx","https:\/\/www.instagram.com\/vboxx\/","https:\/\/www.linkedin.com\/company\/vboxx-b-v-","https:\/\/www.youtube.com\/channel\/UC-VmfbaWx3ggYr58qB4fXPQ"]},{"@type":"Person","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/051fe35f51b1b012282e42dfb499ac55","name":"vBoxx Team","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/vboxxcloud.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1bbde6f660df3c62711061bc31f1a2fd16a6d3e35799e9e97f66d27d4e58ade7?s=96&d=mm&r=g","caption":"vBoxx Team"}}]}},"_links":{"self":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts\/10034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/comments?post=10034"}],"version-history":[{"count":0,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/posts\/10034\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/media\/10037"}],"wp:attachment":[{"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/media?parent=10034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/categories?post=10034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vboxxcloud.com\/blog\/wp-json\/wp\/v2\/tags?post=10034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}