{"id":3728,"date":"2022-03-30T06:25:00","date_gmt":"2022-03-30T06:25:00","guid":{"rendered":"https:\/\/desktrack.timentask.com\/blog\/?p=3728"},"modified":"2024-05-03T08:25:29","modified_gmt":"2024-05-03T08:25:29","slug":"importance-of-user-behavior-analytics","status":"publish","type":"post","link":"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/","title":{"rendered":"Importance of User Behavior Analytics : A Quick Guide"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">To learn more about users and their habits, companies need to dive deeper. One of the ways you can gain more insight is through user behavior analytics software. But can you easily understand this valuable tool? Can it provide actionable data? Yes! Here is a quick guide to help you get started.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">There\u2019s no denying that cybercrime is becoming a more serious issue for businesses in many countries, including the US and India. With the diversification of employment and work patterns in recent years, providing security with traditional security measures that only apply to specific sites and points has become more challenging. Users are becoming the security limits because even minor carelessness on humans, the users, might result in the disclosure of sensitive information. One of the best ways is to implement User Behavior Analytics tools (UBA) which are also called User and Entity Behavior Analytics (UEBA) that can help in fighting against cyber criminals.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">According to the report from Dataprot stats, more than 68 records get stolen from the organization every second globally. In addition, it is found that the average data breach cost is around $3.92 million. Similarly, Verizon\u2019s Data Breach Incident Report (DBIR) report states that insider assaults are perceived as a threat by 74% of businesses. There is a separate study conducted by the Carnegie Mellon University Software Engineering Institute, which states that insider attacks, compared to outside attacks are more damaging.<\/span><\/p>\n<p><span id=\"2\" style=\"font-weight: 400;\">UBAs and UEBAs are technologies that can track activities on a network and alert users when they deviate from the norm. User behavior analytics tools can aid in detecting insider threats and preventing harmful attacks.<\/span><\/p>\n<div class=\"wp-block-button is-style-outline has-dark-red-color has-ek-indent\" style=\"--ek-indent: 20px; text-align: center; color: #224b75;\"><a class=\"wp-block-button__link has-dark-red-color has-electric-grass-gradient-background has-text-color has-background\" href=\"https:\/\/desktrack.timentask.com\/site\/demo\">Get Free Demo<\/a><\/div>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_65 counter-hierarchy ez-toc-counter ez-toc-custom ez-toc-container-direction\">\n<div class=\"ez-toc-title-container\">\n<p class=\"ez-toc-title \" >Table of Contents<\/p>\n<span class=\"ez-toc-title-toggle\"><a href=\"#\" class=\"ez-toc-pull-right ez-toc-btn ez-toc-btn-xs ez-toc-btn-default ez-toc-toggle\" aria-label=\"Toggle Table of Content\"><span class=\"ez-toc-js-icon-con\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #0a0a0a;color:#0a0a0a\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #0a0a0a;color:#0a0a0a\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/span><\/a><\/span><\/div>\n<nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#What_are_User_Behavior_Analytics_and_Tools\" title=\"What are User Behavior Analytics and Tools?\">What are User Behavior Analytics and Tools?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Different_Types_of_Insider_Threats\" title=\"Different Types of Insider Threats\">Different Types of Insider Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#How_does_UBA_work\" title=\"How does UBA work?\">How does UBA work?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Make_your_workday_more_productive\" title=\"Make your workday more productive\">Make your workday more productive<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#How_UBA_Tools_Identify_Insider_Threats\" title=\"How UBA Tools Identify Insider Threats?\">How UBA Tools Identify Insider Threats?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#How_do_User_Behavior_Analytics_Tools_Help_Organizations\" title=\"How do User Behavior Analytics Tools Help Organizations?\">How do User Behavior Analytics Tools Help Organizations?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#How_DeskTrack_Worth_Invest_as_a_UBA_Tool\" title=\"How DeskTrack Worth Invest as a UBA Tool?\">How DeskTrack Worth Invest as a UBA Tool?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Pros_and_Cons\" title=\"Pros and Cons\">Pros and Cons<\/a><ul class='ez-toc-list-level-3' ><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Pros\" title=\"Pros\">Pros<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-10\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Cons\" title=\"Cons\">Cons<\/a><\/li><\/ul><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-11\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#How_to_Choose_the_Best_UBA_Tools\" title=\"How to Choose the Best UBA Tools?\">How to Choose the Best UBA Tools?<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-12\" href=\"https:\/\/desktrack.timentask.com\/blog\/importance-of-user-behavior-analytics\/#Conclusion\" title=\"Conclusion\">Conclusion<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"What_are_User_Behavior_Analytics_and_Tools\"><\/span><span style=\"font-weight: 400;\">What are User Behavior Analytics and Tools?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">User behavior analytics is integrated into employee monitoring and insider threat detection software. This tool collects data on each employee\u2019s digital activities to learn more about how they work. The user behavior analytics definition by Gartner is user and entity behavior analytics provides complete profiling of the data based on various analytics approaches, which often combine fundamental analytics methods with advanced analytics. Vendors consider using analytics to help to understand the overall activities of users along with other entities. The process further helps to uncover potential incidents for users and entities.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">UBA tools come with features having the potential to analyze historical data logs, stored in different forms in log management and SIEM systems. It further helps to discover traffic patterns coming from malicious user actions.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">UBA carries more profiling and exception monitoring capabilities than the SIEM and is further utilized for two significant purposes. Firstly, UBA techniques are helpful to establish a baseline of routine activities that are unique to the company and its users. Secondly, these tools are beneficial to spot outliers or deviations from the norm, and UBA assesses these variances in near-real-time using big data and machine learning technologies.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">A report from Accenture Security, \u201c2017 Cost of Cyber-Crime Study,\u201d presented that, on average, companies have to spend an annual cost of $11.7 million due to an increased cyber threat. All these have pushed the importance of user behavior analytics.<\/span><\/p>\n<p><span id=\"3\" style=\"font-weight: 400;\">Not every time, do companies face <\/span><a href=\"https:\/\/desktrack.timentask.com\/blog\/employee-time-theft-at-workplace\/\"><b>employee time theft<\/b><\/a><span style=\"font-weight: 400;\"> from outside but from the insiders. These insider threats are one of the major concerns for companies. Insider threat further results in a data breach, theft of intellectual property, and other organizational loss. This is where user behavior analytics enters the picture.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"Different_Types_of_Insider_Threats\"><\/span><span style=\"font-weight: 400;\">Different Types of Insider Threats<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><b>Current Employees\u2013<\/b><span style=\"font-weight: 400;\"> These employees unknowingly expose the system to a third party. It is the most common sort of insider threat. It occurs as a result of human error, such as leaving a gadget unattended or falling prey to a hoax.<\/span><\/p>\n<p><b>Ex-employees\u2013<\/b><span style=\"font-weight: 400;\"> Someone who intentionally takes away the data from his\/her current competitor employee to destroy the image and bring down the business.<\/span><\/p>\n<p><b>Mole\u2013<\/b><span style=\"font-weight: 400;\"> An imposter gained insider access to a privileged network despite being nominally an outsider. This is someone who impersonates an employee or partner from outside the company.<\/span><\/p>\n<p><b>Insider Threats are divided into three categories:<\/b><\/p>\n<p><b>Compromised\u2013<\/b><span style=\"font-weight: 400;\"> The one who makes no conscious decision to act upon the data inappropriately.<\/span><\/p>\n<p><b>Negligent\u2013<\/b><span style=\"font-weight: 400;\"> The same type of person does the act without any intention of harming the company<\/span><\/p>\n<p><b>Malicious\u2013<\/b><span style=\"font-weight: 400;\"> If an employee appears disgruntled or has a grudge against someone, or if an employee begins to take on extra work with an unusual amount of zeal, this could be a sign of foul play.<\/span><\/p>\n<p><span id=\"4\" style=\"font-weight: 400;\">Organizations can utilize <\/span><a href=\"https:\/\/desktrack.timentask.com\/time-tracking-software\"><b>employee time tracking software<\/b><\/a><span style=\"font-weight: 400;\"> to get detailed data to understand typical user conduct, which can subsequently be used to spot odd or suspicious behavior.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_does_UBA_work\"><\/span><span style=\"font-weight: 400;\">How does UBA work?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Once you know the importance of user behavior analytics, you will also know that the tool is simply an algorithm that collects, analyses, and assesses the complete historical data, user activity, and security alerts.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It comprises individual user titles, access to given accounts, accounts and permissions, user activity, historical user infringement, and firewall detectors. Historical logs are utilize to collect and analyze data, but the system also keeps track of current activity, real-time resource usage, duration of sessions on accounts and within folders, connectivity, access points, and peer group activity.<\/span><\/p>\n<p><span id=\"5\" style=\"font-weight: 400;\">The tool then compares the data\u2019s interpretation to find probable \u201canomalous behavior\u201d. When the system detects unusual behavior, it will automatically keep track of the activity.\u00a0<\/span><\/p>\n<div class=\"\">\n<div style=\"border-radius: 1.1rem; overflow: hidden; padding: 2rem 0rem; box-shadow: 0 0rem 0.4rem #ddd; margin: 1rem 1rem; border-top: 0.4rem solid #1e3a88;\">\n<div style=\"overflow: hidden; margin: auto; text-align: center;\">\n<div class=\"box-responsive\" style=\"padding-top: 3rem; width: 50%; display: inline-block;\"><img decoding=\"async\" src=\"https:\/\/desktrack.timentask.com\/blog\/wp-content\/uploads\/2022\/08\/desktrack_call_to_action.png\" alt=\"Bio-plugin-SDK\" width=\"\" \/><\/div>\n<div class=\"box-responsive\" style=\"width: 49%; float: right;\">\n<h2 style=\"margin: 6px !important;\"><span class=\"ez-toc-section\" id=\"Make_your_workday_more_productive\"><\/span>Make your workday more productive<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p style=\"margin: 12px !important; font-size: 17px;\">Time tracking and work management can help you reach your goals faster.<\/p>\n<div style=\"padding: 0.5rem 0;\">\n<p class=\"\">Try 15 Days for Free<\/p>\n<\/div>\n<p><a style=\"display: table; margin: 0 auto; background: #1e3a88; color: #fff; padding: 0.5rem 2rem; border-radius: 5rem; font-size: 1.5rem;\" href=\"https:\/\/desktrack.timentask.com\/site\/index?get_started=true\" target=\"_blank\" rel=\"noopener noreferrer\">Start Free Trial<\/a><\/p>\n<\/div>\n<\/div>\n<\/div>\n<\/div>\n<h2><span class=\"ez-toc-section\" id=\"How_UBA_Tools_Identify_Insider_Threats\"><\/span><span style=\"font-weight: 400;\">How UBA Tools Identify Insider Threats?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Since the UBA software provides complete insight into insider risk intelligence, Cybersecurity teams may focus on decreasing the insider dangers to which they have been informed. The unit can also keep an eye on the UBA data in real-time to see if basic movement is happening beyond the point. An employee who has unauthorized access to a file or network can be detected by the cybersecurity team. It could also mean you have a careless insider, hacked credentials, or criminal behavior.<\/span><\/p>\n<p><span id=\"6\" style=\"font-weight: 400;\">One of the essential features of UBA tools is that they don\u2019t send too many false positives to the Cybersecurity team. The tool carries Machine Learning, Algorithms, and Statistics to construct and show a baseline behavior pattern or profile.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_do_User_Behavior_Analytics_Tools_Help_Organizations\"><\/span><span style=\"font-weight: 400;\">How do User Behavior Analytics Tools Help Organizations?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">There are user behavior analytics examples or ways to present how they can help organizations. Some of them are-<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Detecting Potential Threat<\/b><\/li>\n<\/ul>\n<p><span id=\"7\" style=\"font-weight: 400;\">No matter where a security breach occurs, it cannot always be avoided. Using user behavior analytics improves your chances of determining where the weaknesses are. If the breach was internal, you might be able to pinpoint the exact moment that a person inserted a USB drive or browsed a malware-infected website or document.<\/span><\/p>\n<ul>\n<li aria-level=\"1\"><b>Optimizing Business Processes<\/b><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Organizations can use User Behavior Analytics Tools to undertake Business Process Mining. The data mining process involves evaluating what each person does in the organization, assessing the findings, and then devising a new approach based on the data.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_DeskTrack_Worth_Invest_as_a_UBA_Tool\"><\/span><span style=\"font-weight: 400;\">How DeskTrack Worth Invest as a UBA Tool?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">With DeskTrack, as a leading user behavior analytics software, an organization can also watch the unlawful activities done by the insider threat. If DeskTrack is configured to respond to unusual user behavior, DeskTrack will respond automatically. To safeguard your company\u2019s network, use both reactive and proactive procedures. Some other ways <\/span><a href=\"https:\/\/desktrack.timentask.com\/\"><b>DeskTrack<\/b><\/a><span style=\"font-weight: 400;\"> User Behavior Analytics tool can assist:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Filter through extensive activity and alert data quickly to find potentially dangerous actions.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Notice any unexpected changes in the user\u2019s schedule or idle time. Add context and intent to investigations using screenshots, videos, and other reports.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">The data is available on the screen within minutes of installation.<\/span><\/li>\n<\/ul>\n<h2><span class=\"ez-toc-section\" id=\"Pros_and_Cons\"><\/span><span style=\"font-weight: 400;\">Pros and Cons<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Here are the pros and cons of the tool:<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Pros\"><\/span><span style=\"font-weight: 400;\">Pros<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Complete Relevant Data- The tool offers relevant data that is useful for creating an anti-theft plan.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Able to Predict Insider Threat- Has all the features to predict insider threat<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Easy to Install and use- As the time tracking software, the UBA is also easy to install and use.<\/span><\/li>\n<\/ul>\n<h3><span class=\"ez-toc-section\" id=\"Cons\"><\/span><span style=\"font-weight: 400;\">Cons<\/span><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p><b>Black Swan events or alert fatigue<\/b><\/p>\n<p><span id=\"8\" style=\"font-weight: 400;\">UBA with machine learning can flag these activities as questionable when a user takes on a new job, works on a project that requires access to a new file or uses a new resource. These activities called \u2018Black Swan\u2019. Black Swan occurrences can cause \u2018alert fatigue\u2019 when you have so many alerts that you don\u2019t know the most urgent or which ones to deal with first.<\/span><\/p>\n<h2><span class=\"ez-toc-section\" id=\"How_to_Choose_the_Best_UBA_Tools\"><\/span><span style=\"font-weight: 400;\">How to Choose the Best UBA Tools?<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Once you understand the user behavior analytics definition and its importance, you can go ahead with purchasing this tool. However, there are other things, including-<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Are you concerned about too many data threats?\u00a0<\/span><\/li>\n<li id=\"9\" style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Does insider threat worry you?<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Is any of the departments underperforming?\u00a0<\/span><\/li>\n<\/ul>\n<div class=\"wp-block-button is-style-outline has-dark-red-color has-ek-indent\" style=\"--ek-indent: 20px; text-align: center; color: #224b75;\"><a class=\"wp-block-button__link has-dark-red-color has-electric-grass-gradient-background has-text-color has-background\" href=\"https:\/\/appdesk.timentask.com\/site\/company-sign-up-new\">Take a Free Trial<\/a><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Conclusion\"><\/span><span style=\"font-weight: 400;\">Conclusion<\/span><span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p><span style=\"font-weight: 400;\">An insider cyber assault could happen to any firm, regardless of size or industry. Some businesses wait until they\u2019ve had a data breach before putting security measures. Commit sure you don\u2019t make this error. User Behavior Analytics provides security information personalized to your organization and prioritized by a security risk. Using DeskTrack User Behavior Analytics Software and an insider threat detection tool, you may proactively prevent data breaches.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Are you know the importance of user behavior analytics tools? User behavior analytics can monitor instant messages, emails, and more to evaluate each employee&#8217;s writing.<\/p>\n","protected":false},"author":1,"featured_media":3730,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[72],"tags":[187],"_links":{"self":[{"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/posts\/3728"}],"collection":[{"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/comments?post=3728"}],"version-history":[{"count":0,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/posts\/3728\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/media\/3730"}],"wp:attachment":[{"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/media?parent=3728"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/categories?post=3728"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/desktrack.timentask.com\/blog\/wp-json\/wp\/v2\/tags?post=3728"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}