{"id":38171,"date":"2014-07-29T10:39:51","date_gmt":"2014-07-29T09:39:51","guid":{"rendered":"https:\/\/loopup.com\/resource-center\/\/conference-call-security-risk-factors-visibility-matters\/"},"modified":"2019-03-20T16:06:41","modified_gmt":"2019-03-20T16:06:41","slug":"conference-call-security-risk-factors-visibility-matters","status":"publish","type":"post","link":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/","title":{"rendered":"6 Conference Call Security Risk Factors (Why Visibility Matters!)"},"content":{"rendered":"<p>I recently wrote about the why visibility is <a title=\"Conference Call Security: Why Visibility is Crucial\" href=\"https:\/\/loopup.com\/resource-center\/blog\/conference-call-security-visibility\/\" target=\"_blank\" rel=\"noopener noreferrer\">crucially important for conference call security<\/a>.&nbsp; Without being able to see a live readout of participants, you can never be sure exactly who\u2019s on the call \u2013 and that no-one is there who shouldn\u2019t be.&nbsp; Sensitive information is often shared on conference calls, and so prioritizing conference call security is essential to avoid unnecessary business risk.&nbsp; Here are 6 conference call security risk factors to look out for when you\u2019re assessing your vulnerability.&nbsp; If you recognize that any of these risk factors are present in your conferencing, then you need to find a product that provides visibility.<\/p>\n<h2>1. Back-to-back meetings<\/h2>\n<p>If you schedule one meeting immediately after another on the same conference facility, there is a chance that at some point you will have participants on the call who shouldn\u2019t be there.&nbsp; This could be because meeting number one runs long, or participants invited to meeting number two may join early.&nbsp; Without visibility of your conference calls, this has the potential to be chaotic as you hear \u2018badoops\u2019 signaling unknown people joining and leaving.&nbsp; Worse than this, though, is the security implication of not knowing who\u2019s on your call.<\/p>\n<h2>2. Recurring meetings<\/h2>\n<p>If you host recurring meetings, anyone with those dial-in details and knowledge of the time of the meeting will be able to join \u2013 even if they are no longer supposed to be involved.&nbsp; Visibility ensures you know who\u2019s on, and can tell if unwanted participants are on the line.<\/p>\n<h2>3. Shared conferencing details<\/h2>\n<p>When an individual does not have their own conference details, they do not have control over when these details are used. Teams sharing a set of codes run the risk of accidentally scheduling conference &nbsp;&nbsp;calls at the same time. This can lead to two sets of participants joining at once or participants invited to one user\u2019s call turning up on the line uninvited. The wider one set of dial-in details is distributed, the higher the chance of people turning up to calls they\u2019re not invited to.&nbsp; Visibility is essential to be able to identify who is on the call at all times.<\/p>\n<h2>4. Third-party suppliers or contractors<\/h2>\n<p>Contingent workers or third-party personnel who spend a short time in your business may well still get access to sensitive details like conference codes. As with high employee turnover, recurring use of the same codes compounds this problem. Pair this with back-to-back meetings and reusing your line and, if you don\u2019t have visibility, the problem multiplies.<\/p>\n<h2>5. High employee turnover<\/h2>\n<p>Organizations with high employee turnover by default have a higher conference call security risk. When employees leave, they may well keep hold of the participant conference call details for calls they attended. If codes aren\u2019t changed, these calls are open indefinitely to eavesdropping from former employees. The most damaging example of this is likely to be the salesperson who moves to a competitor, but could in theory continue to listen into and gain information on the former employee\u2019s customers and pipeline with poaching in mind.&nbsp; Visibility lets the call leader know who\u2019s on the line \u2013 when combined with suitable call controls, the leader can isolate the line of anyone unfamiliar, and drop them from the call if needed.<\/p>\n<h2>6. Large number of participants<\/h2>\n<p>Of course, more participants invited to a call means more people with access to the codes and the ability to use them in future. More pertinently, though, if the call host is relying on the badoops signaling participants joining and leaving, it will be extremely hard to keep track, meaning that any unwanted participants may pass unnoticed \u2013 and can lead to that conferencing classic \u201cwho just left?\u201d&nbsp; Visibility lets the call leader <i>see<\/i> whom these \u2018badoops\u2019 relate to.<\/p>\n<p>If you identify with several of these risk factors \u2013 and you don\u2019t have visibility on your calls \u2013 then you are at risk of unwanted participants listening in, whether as an innocent mistake or something more sinister.&nbsp; As a matter of priority, investigate providers who do offer this level of visibility, but be sure that the visibility is presented in an easy-to-use way, so that you will reap the benefits of this crucial piece of information.<\/p>\n<p><em>Read more:<\/em><\/p>\n<p><a title=\"Conference Call Security: Why Visibility is Crucial\" href=\"https:\/\/loopup.com\/resource-center\/blog\/technology-solutions\/conference-call-security-visibility\/\" target=\"_blank\" rel=\"noopener noreferrer\">Conference Call Security: Why Visibility is Crucial<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>I recently wrote about the why visibility is crucially important for conference call security.&nbsp; Without being able to see a live readout of participants, you can never be sure exactly&#8230;<\/p>\n","protected":false},"author":4,"featured_media":38172,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[424],"tags":[39,37],"class_list":["post-38171","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","tag-conference-call-security","tag-visibility"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v25.2 (Yoast SEO v25.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>6 Conference Call Security Risk Factors (Why Visibility Matters!) | LoopUp<\/title>\n<meta name=\"description\" content=\"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"6 Conference Call Security Risk Factors (Why Visibility Matters!)\" \/>\n<meta property=\"og:description\" content=\"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\" \/>\n<meta property=\"og:site_name\" content=\"LoopUp\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/LoopUp\" \/>\n<meta property=\"article:published_time\" content=\"2014-07-29T09:39:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-03-20T16:06:41+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png\" \/>\n\t<meta property=\"og:image:width\" content=\"625\" \/>\n\t<meta property=\"og:image:height\" content=\"320\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Catriona Balfour\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@catrionabalfour\" \/>\n<meta name=\"twitter:site\" content=\"@LoopUp\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Catriona Balfour\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\"},\"author\":{\"name\":\"Catriona Balfour\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a\"},\"headline\":\"6 Conference Call Security Risk Factors (Why Visibility Matters!)\",\"datePublished\":\"2014-07-29T09:39:51+00:00\",\"dateModified\":\"2019-03-20T16:06:41+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\"},\"wordCount\":732,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/loopup.com\/us\/#organization\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png\",\"keywords\":[\"conference call security\",\"visibility\"],\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\",\"url\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\",\"name\":\"6 Conference Call Security Risk Factors (Why Visibility Matters!) | LoopUp\",\"isPartOf\":{\"@id\":\"https:\/\/loopup.com\/us\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png\",\"datePublished\":\"2014-07-29T09:39:51+00:00\",\"dateModified\":\"2019-03-20T16:06:41+00:00\",\"description\":\"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.\",\"breadcrumb\":{\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage\",\"url\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png\",\"contentUrl\":\"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png\",\"width\":625,\"height\":320},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/loopup.com\/us\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\/\/loopup.com\/us\/resource-type\/blog\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"6 Conference Call Security Risk Factors (Why Visibility Matters!)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/loopup.com\/us\/#website\",\"url\":\"https:\/\/loopup.com\/us\/\",\"name\":\"LoopUp\",\"description\":\"Simplify your world, Consolidate your multinational Teams telephony globally.\",\"publisher\":{\"@id\":\"https:\/\/loopup.com\/us\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/loopup.com\/us\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/loopup.com\/us\/#organization\",\"name\":\"LoopUp\",\"url\":\"https:\/\/loopup.com\/us\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png\",\"contentUrl\":\"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png\",\"width\":200,\"height\":200,\"caption\":\"LoopUp\"},\"image\":{\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/LoopUp\",\"https:\/\/x.com\/LoopUp\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a\",\"name\":\"Catriona Balfour\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/loopup.com\/us\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g\",\"caption\":\"Catriona Balfour\"},\"description\":\"Catriona Balfour is a Senior Product Manager at LoopUp, based in San Francisco.\",\"sameAs\":[\"http:\/\/uk.linkedin.com\/in\/catrionabalfour\/\",\"https:\/\/x.com\/catrionabalfour\"],\"url\":\"https:\/\/loopup.com\/us\/resource-center\/author\/luteam\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"6 Conference Call Security Risk Factors (Why Visibility Matters!) | LoopUp","description":"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/","og_locale":"en_US","og_type":"article","og_title":"6 Conference Call Security Risk Factors (Why Visibility Matters!)","og_description":"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.","og_url":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/","og_site_name":"LoopUp","article_publisher":"https:\/\/www.facebook.com\/LoopUp","article_published_time":"2014-07-29T09:39:51+00:00","article_modified_time":"2019-03-20T16:06:41+00:00","og_image":[{"width":625,"height":320,"url":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png","type":"image\/png"}],"author":"Catriona Balfour","twitter_card":"summary_large_image","twitter_creator":"@catrionabalfour","twitter_site":"@LoopUp","twitter_misc":{"Written by":"Catriona Balfour","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#article","isPartOf":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/"},"author":{"name":"Catriona Balfour","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a"},"headline":"6 Conference Call Security Risk Factors (Why Visibility Matters!)","datePublished":"2014-07-29T09:39:51+00:00","dateModified":"2019-03-20T16:06:41+00:00","mainEntityOfPage":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/"},"wordCount":732,"commentCount":0,"publisher":{"@id":"https:\/\/loopup.com\/us\/#organization"},"image":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png","keywords":["conference call security","visibility"],"articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/","url":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/","name":"6 Conference Call Security Risk Factors (Why Visibility Matters!) | LoopUp","isPartOf":{"@id":"https:\/\/loopup.com\/us\/#website"},"primaryImageOfPage":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage"},"image":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage"},"thumbnailUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png","datePublished":"2014-07-29T09:39:51+00:00","dateModified":"2019-03-20T16:06:41+00:00","description":"Here are 6 conference call security risk factors to look out for. These risk factors underline that visibility is crucial to conference call security.","breadcrumb":{"@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#primaryimage","url":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png","contentUrl":"https:\/\/loopup.com\/app\/uploads\/2015\/12\/Conference-Call-Security-Risk-Factors-Why-Visibility-Matters.png","width":625,"height":320},{"@type":"BreadcrumbList","@id":"https:\/\/loopup.com\/us\/resource-center\/blog\/conference-call-security-risk-factors-visibility-matters\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/loopup.com\/us\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/loopup.com\/us\/resource-type\/blog\/"},{"@type":"ListItem","position":3,"name":"6 Conference Call Security Risk Factors (Why Visibility Matters!)"}]},{"@type":"WebSite","@id":"https:\/\/loopup.com\/us\/#website","url":"https:\/\/loopup.com\/us\/","name":"LoopUp","description":"Simplify your world, Consolidate your multinational Teams telephony globally.","publisher":{"@id":"https:\/\/loopup.com\/us\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/loopup.com\/us\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/loopup.com\/us\/#organization","name":"LoopUp","url":"https:\/\/loopup.com\/us\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/","url":"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png","contentUrl":"https:\/\/loopup.com\/app\/uploads\/2016\/08\/Coloured_Logo_White_Background_200x200.png","width":200,"height":200,"caption":"LoopUp"},"image":{"@id":"https:\/\/loopup.com\/us\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/LoopUp","https:\/\/x.com\/LoopUp"]},{"@type":"Person","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/a0eeb02ebfcf3a2c56d738ac1ee0180a","name":"Catriona Balfour","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/loopup.com\/us\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/44dd695d35e14af1efc75f7b4c6fa9dc3c6db634a9ae6ff2efdf89a3fe2190bb?s=96&d=mm&r=g","caption":"Catriona Balfour"},"description":"Catriona Balfour is a Senior Product Manager at LoopUp, based in San Francisco.","sameAs":["http:\/\/uk.linkedin.com\/in\/catrionabalfour\/","https:\/\/x.com\/catrionabalfour"],"url":"https:\/\/loopup.com\/us\/resource-center\/author\/luteam\/"}]}},"_links":{"self":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts\/38171","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/comments?post=38171"}],"version-history":[{"count":0,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/posts\/38171\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/media\/38172"}],"wp:attachment":[{"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/media?parent=38171"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/categories?post=38171"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/loopup.com\/us\/wp-json\/wp\/v2\/tags?post=38171"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}