{"id":91347,"date":"2018-08-31T13:19:25","date_gmt":"2018-08-31T20:19:25","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=91347"},"modified":"2025-08-13T01:06:25","modified_gmt":"2025-08-13T08:06:25","slug":"seamless-security-for-the-connected-consumer","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/","title":{"rendered":"Seamless Security for the Connected Consumer"},"content":{"rendered":"<p>Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for so many things \u2013 to wake us up, count calories, connect us to friends and loved ones, provide access to the web, the list goes on. We love our devices, that much is clear. But this love has almost become bittersweet due to growing concerns about how using these devices impact our privacy.<\/p>\n<p style=\"text-align: center;\"><iframe loading=\"lazy\" src=\"https:\/\/www.youtube.com\/embed\/-rKEgQNIQOo\" width=\"500\" height=\"315\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><span data-mce-type=\"bookmark\" style=\"display: inline-block; width: 0px; overflow: hidden; line-height: 0;\" class=\"mce_SELRES_start\">\ufeff<\/span><\/iframe><\/p>\n<p>Not so long ago, cybersecurity was a distant idea for many of us. But big-name data breaches and attacks changed all of that. Dyn, WannaCry, and Equifax soon became household names, causing us to consider how we use connected devices, what exactly we connect to, and who we share their information with. As Kelly Sheridan, a <a href=\"https:\/\/www.darkreading.com\/endpoint\/breaches-drive-consumer-stress-over-cybersecurity\/d\/d-id\/1331693\" target=\"_blank\" rel=\"noopener\">reporter at Dark Reading<\/a>, states \u201cA few years ago, many people didn&#8217;t talk about cybersecurity or even pay much attention to it. These days, it&#8217;s a growing source of stress among consumers, who rely on several devices and businesses to protect their data.\u201d Now, with cybersecurity making all of us anxious, the next question is, how can we enjoy the convenience of our personal devices while still remaining secure?<\/p>\n<h2>How to Remain Connected and Protected<\/h2>\n<p>Staying connected doesn\u2019t have to be a bittersweet experience. In fact, we can do a lot to empower ourselves and become security savvy. To remain protected anywhere we are connected, we can look to McAfee for a seamless, simple yet powerful security experience.<\/p>\n<p>McAfee aims to make it easy for everyone to protect what matters most. We understand the complexity of managing multiple devices in our already busy lives. We understand that the last thing users need is a complex product for securing devices. Our focus at McAfee is to simplify digital protection by providing a seamless unified experience. So, whether you are at home, or out and about, McAfee\u2019s protects your identity, your data, and your devices all with the same delightful, unified user experience powered by McAfee\u2019s cloud. Our goal is to create an effortless onboarding experience and make it quick and easy to set up digital security for you and your entire family. Plus, you can manage it all from a simple mobile app so you can get notified when a new threat is discovered and receive tips for staying protected.<\/p>\n<p>Now, you can rest assured that your identity and your digital privacy are protected with security that is effective, simple and meaningful. You will be able to use their devices anywhere and stay protected against any threat, on any network. With this approach, living a connected lifestyle no longer has to be bittersweet.<\/p>\n<p>To learn more about consumer security and our approach to it, be sure to follow us at <a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener\">@McAfee<\/a> and <a href=\"https:\/\/twitter.com\/McAfee_Home\" target=\"_blank\" rel=\"noopener\">@McAfee_Home<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We&#8230;<\/p>\n","protected":false},"author":1040,"featured_media":130414,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,13],"tags":[4452],"coauthors":[5587],"class_list":["post-91347","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-privacy-identity-protection","tag-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Seamless Security for the Connected Consumer | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Seamless Security for the Connected Consumer | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2018-08-31T20:19:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-13T08:06:25+00:00\" \/>\n<meta name=\"author\" content=\"Shailaja Shankar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Shailaja Shankar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\"},\"author\":{\"name\":\"Shailaja Shankar\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\"},\"headline\":\"Seamless Security for the Connected Consumer\",\"datePublished\":\"2018-08-31T20:19:25+00:00\",\"dateModified\":\"2025-08-13T08:06:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\"},\"wordCount\":478,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"keywords\":[\"cybersecurity\"],\"articleSection\":[\"Internet Security\",\"Privacy &amp; Identity Protection\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\",\"name\":\"Seamless Security for the Connected Consumer | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"datePublished\":\"2018-08-31T20:19:25+00:00\",\"dateModified\":\"2025-08-13T08:06:25+00:00\",\"description\":\"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg\",\"width\":614,\"height\":300,\"caption\":\"everyday connected devices\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Seamless Security for the Connected Consumer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5\",\"name\":\"Shailaja Shankar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg\",\"caption\":\"Shailaja Shankar\"},\"description\":\"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Seamless Security for the Connected Consumer | McAfee Blog","description":"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Seamless Security for the Connected Consumer | McAfee Blog","og_description":"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2018-08-31T20:19:25+00:00","article_modified_time":"2025-08-13T08:06:25+00:00","author":"Shailaja Shankar","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Shailaja Shankar","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/"},"author":{"name":"Shailaja Shankar","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5"},"headline":"Seamless Security for the Connected Consumer","datePublished":"2018-08-31T20:19:25+00:00","dateModified":"2025-08-13T08:06:25+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/"},"wordCount":478,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","keywords":["cybersecurity"],"articleSection":["Internet Security","Privacy &amp; Identity Protection"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/","name":"Seamless Security for the Connected Consumer | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","datePublished":"2018-08-31T20:19:25+00:00","dateModified":"2025-08-13T08:06:25+00:00","description":"Laptops, mobile phones, tablets, smartwatches, and more are all often found in a modern user\u2019s arsenal of personal devices. We rely on these devices for","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/10\/614x300_EverydayConnectedDevices.jpg","width":614,"height":300,"caption":"everyday connected devices"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/seamless-security-for-the-connected-consumer\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"Seamless Security for the Connected Consumer"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/8f583cc591401f92521b5efd0542e5d5","name":"Shailaja Shankar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/2abe5e56865d1e1f7e90f294b861ea26","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/05\/Shaila-Shankar_Headshot-2020-e1621276254455-96x96.jpg","caption":"Shailaja Shankar"},"description":"A seasoned technology and business executive with extensive experience building world class teams and best of breed software products. Shailaja has led global engineering teams delivering cloud-enabled security software solutions to &gt;500 million users. A passionate leader with a proven track record for launching innovative and first-to-market security solutions across consumer, SMB and enterprise segments. Most recently, as the General Manager of WW Mobile and ISP Business Unit, Shailaja lead the consumer IoT and connected home security strategy and execution leading a cross-functional team working with ISPs, Telcos, MVNOs and Router OEMs. Currently, Shailaja is responsible for security and threat defense solutions across endpoint platforms (ENS and EDR), eXtended detection and response platform (MVision XDR), data center security, and Cloud Native Application Protection Platform (MVision CNAPP).","sameAs":["https:\/\/www.linkedin.com\/in\/shailaja-k-shankar-17740b1\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/shaila-shankar\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91347","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1040"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=91347"}],"version-history":[{"count":3,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91347\/revisions"}],"predecessor-version":[{"id":219383,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/91347\/revisions\/219383"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/130414"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=91347"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=91347"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=91347"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=91347"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}