{"id":2527,"date":"2016-09-13T15:51:35","date_gmt":"2016-09-13T19:51:35","guid":{"rendered":"https:\/\/blog.spcollege.edu\/information-technology\/?p=2527"},"modified":"2024-01-30T16:06:24","modified_gmt":"2024-01-30T21:06:24","slug":"social-engineering-ceo-fraud-attacks","status":"publish","type":"post","link":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/","title":{"rendered":"Social Engineering and CEO Fraud attacks"},"content":{"rendered":"<p>Social Engineering and CEO Fraud attacks are hot topics in the field of Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting. Open to the public, the free meeting will be held:<\/p>\n<p>Saturday, Sept. 17, 10 a.m. &#8211; 1 p.m.<br \/>\nSouth University<br \/>\n<a href=\"https:\/\/www.google.com\/maps\/place\/4401+N+Himes+Ave+%23175,+Tampa,+FL+33614\/@27.9822988,-82.5024986,17z\/data=!3m1!4b1!4m5!3m4!1s0x88c2c3c1149c82cb:0x23100b928c36d28c!8m2!3d27.9822988!4d-82.5003099\">4401 North Himes Avenue, #175<\/a><br \/>\nTampa, FL 33614<\/p>\n<h2>What is Social Engineering?<\/h2>\n<p>Wikipedia provides the following definition of Social Engineering:<\/p>\n<p>&#8220;<b>Social engineering<\/b>, in the context of information security, refers to psychological manipulation of people into performing actions or divulging confidential information. A type of confidence trick for the purpose of information gathering, fraud, or system access, it differs from a traditional &#8220;con&#8221; in that it is often one of many steps in a more complex fraud scheme.&#8221;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-2528 size-medium\" src=\"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg\" alt=\"Erich Kron speaks on Social Engineering and CEO Fraud\" width=\"300\" height=\"300\" srcset=\"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg 300w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-150x150.jpg 150w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-32x32.jpg 32w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-64x64.jpg 64w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-96x96.jpg 96w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-128x128.jpg 128w, https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-content\/uploads\/sites\/8\/2016\/09\/kron.jpg 400w\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" \/>Guest speaker Erich Kron will give the presentation, covering the latest CEO Fraud and Social Engineering and Ransomware attacks and how to counter them effectively.<\/p>\n<p>A Security Awareness Advocate at KnowBe4, Kron has more than 18 years experience in information security. <a href=\"https:\/\/www.linkedin.com\/in\/erich-kron-16158a14\" target=\"_blank\" rel=\"noopener\">View his profile on LinkedIn.<\/a><\/p>\n<p>Other topics that will be discussed at the meeting include:<\/p>\n<ul>\n<li>CTF Academy<\/li>\n<li>Shodan Training Class<\/li>\n<li>CISSP BootCamp<\/li>\n<li>Women in Linux Event<\/li>\n<li>Women in Technology Event<\/li>\n<li>BSI Event<\/li>\n<li>(ISC)2 Security Congress<\/li>\n<li>Additional events<\/li>\n<li>BSides Tampa 2017<\/li>\n<\/ul>\n<p><a href=\"http:\/\/isc2chapter.us4.list-manage.com\/track\/click?u=d59a0df0c5daee3541a11321d&amp;id=a3c3043e21&amp;e=2efc00d583\" target=\"_blank\" rel=\"noopener\">RSVP online<\/a> if you plan to attend the meeting.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Social Engineering and CEO Fraud attacks are hot topics in the field of Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting. Open to the public, the free meeting will be held: Saturday, Sept. 17, 10 a.m. &#8211; 1 p.m. South University 4401 North Himes Avenue, #175 Tampa, FL &hellip; <a href=\"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/\" class=\"more-link\">Continue reading <span class=\"screen-reader-text\">Social Engineering and CEO Fraud attacks<\/span> <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":18,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[15],"tags":[],"coauthors":[97],"class_list":["post-2527","post","type-post","status-publish","format-standard","hentry","category-ccit"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\r\n<title>Social Engineering and CEO Fraud Attacks<\/title>\r\n<meta name=\"description\" content=\"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Social Engineering and CEO Fraud Attacks\" \/>\r\n<meta property=\"og:description\" content=\"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/\" \/>\r\n<meta property=\"og:site_name\" content=\"Technology\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/stpetecollege\/\" \/>\r\n<meta property=\"article:published_time\" content=\"2016-09-13T19:51:35+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-01-30T21:06:24+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg\" \/>\r\n<meta name=\"author\" content=\"Barbara Wolter\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@spcnews\" \/>\r\n<meta name=\"twitter:site\" content=\"@spcnews\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Barbara Wolter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/\"},\"author\":{\"name\":\"Barbara Wolter\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/#\\\/schema\\\/person\\\/d4af50b70b665bd789d47dab45685e80\"},\"headline\":\"Social Engineering and CEO Fraud attacks\",\"datePublished\":\"2016-09-13T19:51:35+00:00\",\"dateModified\":\"2024-01-30T21:06:24+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/\"},\"wordCount\":215,\"image\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.spcollege.edu\\\/information-technology\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2016\\\/09\\\/kron-300x300.jpg\",\"articleSection\":[\"College of Computer and Information Technology\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/\",\"url\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/\",\"name\":\"Social Engineering and CEO Fraud Attacks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/blog.spcollege.edu\\\/information-technology\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2016\\\/09\\\/kron-300x300.jpg\",\"datePublished\":\"2016-09-13T19:51:35+00:00\",\"dateModified\":\"2024-01-30T21:06:24+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/#\\\/schema\\\/person\\\/d4af50b70b665bd789d47dab45685e80\"},\"description\":\"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#primaryimage\",\"url\":\"https:\\\/\\\/blog.spcollege.edu\\\/information-technology\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2016\\\/09\\\/kron-300x300.jpg\",\"contentUrl\":\"https:\\\/\\\/blog.spcollege.edu\\\/information-technology\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2016\\\/09\\\/kron-300x300.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/social-engineering-ceo-fraud-attacks\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Social Engineering and CEO Fraud attacks\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/#website\",\"url\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/\",\"name\":\"Technology\",\"description\":\"Read about the state-of-the-art facilities and classes that prepare students for a technology career.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/#\\\/schema\\\/person\\\/d4af50b70b665bd789d47dab45685e80\",\"name\":\"Barbara Wolter\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=gcc6e86d7c9ebeeee43d5647b54d3a6a5\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=g\",\"caption\":\"Barbara Wolter\"},\"url\":\"https:\\\/\\\/blog.spcollege.edu\\\/technology-educational-information\\\/author\\\/barbara-wolter\\\/\"}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Social Engineering and CEO Fraud Attacks","description":"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/","og_locale":"en_US","og_type":"article","og_title":"Social Engineering and CEO Fraud Attacks","og_description":"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.","og_url":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/","og_site_name":"Technology","article_publisher":"https:\/\/www.facebook.com\/stpetecollege\/","article_published_time":"2016-09-13T19:51:35+00:00","article_modified_time":"2024-01-30T21:06:24+00:00","og_image":[{"url":"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg","type":"","width":"","height":""}],"author":"Barbara Wolter","twitter_card":"summary_large_image","twitter_creator":"@spcnews","twitter_site":"@spcnews","twitter_misc":{"Written by":"Barbara Wolter","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#article","isPartOf":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/"},"author":{"name":"Barbara Wolter","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/#\/schema\/person\/d4af50b70b665bd789d47dab45685e80"},"headline":"Social Engineering and CEO Fraud attacks","datePublished":"2016-09-13T19:51:35+00:00","dateModified":"2024-01-30T21:06:24+00:00","mainEntityOfPage":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/"},"wordCount":215,"image":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg","articleSection":["College of Computer and Information Technology"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/","url":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/","name":"Social Engineering and CEO Fraud Attacks","isPartOf":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/#website"},"primaryImageOfPage":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#primaryimage"},"image":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#primaryimage"},"thumbnailUrl":"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg","datePublished":"2016-09-13T19:51:35+00:00","dateModified":"2024-01-30T21:06:24+00:00","author":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/#\/schema\/person\/d4af50b70b665bd789d47dab45685e80"},"description":"Social Engineering and CEO Fraud attacks are hot topics in Cyber Security and will be the main topic at the quarterly (ISC)2 Tampa Chapter meeting.","breadcrumb":{"@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#primaryimage","url":"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg","contentUrl":"https:\/\/blog.spcollege.edu\/information-technology\/wp-content\/uploads\/sites\/8\/2016\/09\/kron-300x300.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/social-engineering-ceo-fraud-attacks\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/blog.spcollege.edu\/technology-educational-information\/"},{"@type":"ListItem","position":2,"name":"Social Engineering and CEO Fraud attacks"}]},{"@type":"WebSite","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/#website","url":"https:\/\/blog.spcollege.edu\/technology-educational-information\/","name":"Technology","description":"Read about the state-of-the-art facilities and classes that prepare students for a technology career.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/blog.spcollege.edu\/technology-educational-information\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/blog.spcollege.edu\/technology-educational-information\/#\/schema\/person\/d4af50b70b665bd789d47dab45685e80","name":"Barbara Wolter","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=gcc6e86d7c9ebeeee43d5647b54d3a6a5","url":"https:\/\/secure.gravatar.com\/avatar\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/abf92b3f90b143b5531a36f3d179c8fb7d980cc245fe9b28dddf5fc3f3d5109c?s=96&d=mm&r=g","caption":"Barbara Wolter"},"url":"https:\/\/blog.spcollege.edu\/technology-educational-information\/author\/barbara-wolter\/"}]}},"_links":{"self":[{"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/posts\/2527","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/users\/18"}],"replies":[{"embeddable":true,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/comments?post=2527"}],"version-history":[{"count":4,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/posts\/2527\/revisions"}],"predecessor-version":[{"id":4807,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/posts\/2527\/revisions\/4807"}],"wp:attachment":[{"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/media?parent=2527"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/categories?post=2527"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/tags?post=2527"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/blog.spcollege.edu\/technology-educational-information\/wp-json\/wp\/v2\/coauthors?post=2527"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}