{"id":67544,"date":"2017-01-04T10:00:53","date_gmt":"2017-01-04T18:00:53","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=67544"},"modified":"2025-08-14T07:37:11","modified_gmt":"2025-08-14T14:37:11","slug":"secure-home-ces-2017","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/","title":{"rendered":"Securing Today\u2019s Connected Home"},"content":{"rendered":"<p>When thinking of cyber threats, <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/malware\" target=\"_blank\" rel=\"noopener noreferrer\">malware<\/a>, <a href=\"https:\/\/www.mcafee.com\/blogs\/consumer\/phishing\" target=\"_blank\" rel=\"noopener noreferrer\">phishing<\/a>, and data breaches typically come to mind. But as 2016 has shown us, threats don\u2019t stop there. Cybercriminals are getting more and more creative and finding new, sophisticated methods of attack to access our data. One of the more successful methods as of late: attacking connected<a href=\"http:\/\/internetofthingsagenda.techtarget.com\/definition\/Internet-of-Things-IoT\" target=\"_blank\" rel=\"noopener noreferrer\"> IoT devices<\/a> in the smart home.<\/p>\n<p>These smart home devices can be almost anything \u2013 a connected thermostat, lightbulb, camera, the list goes on. In fact, <a href=\"http:\/\/www.komando.com\/tips\/342798\/5-internet-of-things-gadgets-you-didnt-know-existed\/all\" target=\"_blank\" rel=\"noopener noreferrer\">according to Gartner<\/a>, there are 5.5 million IoT devices connected in homes each day around the world. And with all of these devices connecting to one router, there\u2019s now that many more gateways into your smart home network, making it more susceptible to compromise.<\/p>\n<p>The question is: how likely is such a breach? Many of these connected devices are manufactured with low security standards. Just remember what happened with <a href=\"https:\/\/securingtomorrow.mcafee.com\/consumer\/consumer-threat-notices\/iot-devices-ddos-attack\/\" target=\"_blank\" rel=\"noopener noreferrer\">the Dyn DDoS attack<\/a>. Low device security standards caused one of the largest Internet of Things (IoT) botnet attacks in recent history, affecting almost the entire east coast in the process.<\/p>\n<p>I know what you might be thinking \u2013 that attack was caused by compromising thousands of IoT devices. But, if a handful of these devices are located in a single home, while the damage may not be as widespread, it can get personal. Once a cybercriminal finds their way inside your home network through these devices, the hacking possibilities are virtually endless. They can control your entire home\u2014 flicker your lights, access your camera to peer into your life, shut down your devices, and worst of all, capture any personal data sent across the network.<\/p>\n<p>Now, with all of these devices\u2014in addition to your computer and phone \u2014 making up unique (and hackable) gateways into your smart home network, a new security approach is needed. This approach is <em>layered security or sometimes referred to defense in deapth<\/em>. The way to create this in your home is by adding protection directly into your gateway to protect all the devices in the home. Additional security such as a firewall and antivirus should also be used to protect your network and PCs, laptops, mobile devices and Macs. \u00a0This layered security strategy is the approach that businesses use to safeguard their data and employees.<\/p>\n<h2>Things to Protect Your Smart Devices<\/h2>\n<p>While companies like ours work to help ensure your connected homes are as secure as possible, there are a few things you can do directly to protect your smart devices today. Here are a couple of tips for protecting your connected home network, today:<\/p>\n<ul>\n<li><strong>Change up your passwords<\/strong><strong>.<\/strong> Take standard security precautions with your connected devices, such as regularly updating your login information. Frequently changing the passwords on both your home router and smart home devices is an easy way to ensure your network is better secured. Make sure the passwords are hard to guess.<\/li>\n<\/ul>\n<ul>\n<li><strong>Apply updates:<\/strong> Very often these connected device manufacturres will create patches to the firmware to fix known bugs and often implement improved security. It\u2019s important to apply updates when notified by the device manufacturer.<\/li>\n<\/ul>\n<ul>\n<li><strong>Be mindful of who\u2019s connecting to your network.<\/strong> We typically don\u2019t think twice about handing out our Wi-Fi password to visitors in our homes, but it\u2019s important to limit access to your network. You can\u2019t keep track of everyone\u2019s activity, so remain conservative and limit who\u2019s getting entry to your gateway.<\/li>\n<li><strong>Do your homework.<\/strong> When looking to purchase a new IoT device for your home, do your due diligence \u2013 research the manufacturer, check security standards, read reviews. If the device doesn\u2019t seem up to par, it\u2019s not worth the risk.<\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>When thinking of cyber threats, malware, phishing, and data breaches typically come to mind. But as 2016 has shown us,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":124868,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10670,10661,13],"tags":[4131,4848,4847],"coauthors":[3973],"class_list":["post-67544","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks","category-internet-security","category-privacy-identity-protection","tag-internet-of-things","tag-smart-devices","tag-smart-home"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Securing Today\u2019s Connected Home | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Today\u2019s Connected Home | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-04T18:00:53+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-14T14:37:11+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"Securing Today\u2019s Connected Home\",\"datePublished\":\"2017-01-04T18:00:53+00:00\",\"dateModified\":\"2025-08-14T14:37:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\"},\"wordCount\":616,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg\",\"keywords\":[\"Internet of Things\",\"smart devices\",\"smart home\"],\"articleSection\":[\"How To Guides and Tutorials\",\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\",\"name\":\"Securing Today\u2019s Connected Home | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg\",\"datePublished\":\"2017-01-04T18:00:53+00:00\",\"dateModified\":\"2025-08-14T14:37:11+00:00\",\"description\":\"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg\",\"width\":614,\"height\":300,\"caption\":\"woman managing her smart home\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Securing Today\u2019s Connected Home\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Securing Today\u2019s Connected Home | McAfee Blog","description":"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Securing Today\u2019s Connected Home | McAfee Blog","og_description":"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2017-01-04T18:00:53+00:00","article_modified_time":"2025-08-14T14:37:11+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"Securing Today\u2019s Connected Home","datePublished":"2017-01-04T18:00:53+00:00","dateModified":"2025-08-14T14:37:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/"},"wordCount":616,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg","keywords":["Internet of Things","smart devices","smart home"],"articleSection":["How To Guides and Tutorials","Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/","name":"Securing Today\u2019s Connected Home | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg","datePublished":"2017-01-04T18:00:53+00:00","dateModified":"2025-08-14T14:37:11+00:00","description":"Cybercriminals are finding new, sophisticated methods of attack to access our data. One of the more successful methods: attacking connected devices in the smart home.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/07\/614x300_MFE_Blogs_072321_Blog.jpg","width":614,"height":300,"caption":"woman managing her smart home"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/secure-home-ces-2017\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Securing Today\u2019s Connected Home"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67544","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=67544"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67544\/revisions"}],"predecessor-version":[{"id":219772,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/67544\/revisions\/219772"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/124868"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=67544"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=67544"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=67544"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=67544"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}