{"id":14,"date":"2024-12-21T14:25:42","date_gmt":"2024-12-21T14:25:42","guid":{"rendered":"https:\/\/chrisingram.guru\/index.php\/empowerwp-pro\/"},"modified":"2026-03-27T15:55:29","modified_gmt":"2026-03-27T15:55:29","slug":"empowerwp-pro","status":"publish","type":"page","link":"https:\/\/chrisingram.guru\/","title":{"rendered":"Front Page"},"content":{"rendered":"<div  data-label=\"Overlappable\" data-id=\"overlappable--1\" data-export-id=\"overlappable-5\" data-category=\"overlappable\" class=\"overlappable-5 content-section content-section-spacing\" data-overlap=\"true\" id=\"overlappable-2\" style=\"background-color: rgb(255, 255, 255);\"><div  class=\"gridContainer\"> <div  data-type=\"row\" class=\"row shadow-medium bg-color-white\"><div  class=\"col-xs-12 col-sm-4 col-padding col-padding-xs bg-color-white\"> <div  class=\"row middle-sm\"><div  class=\"col-xs-12 col-sm-fit icon-column\"> <i  class=\"fa fa-paper-plane icon bordered round color2\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm v-spacing\"><h5  class=\"\">Expertise You Can Trust<\/h5><\/div> <\/div> <div  class=\"row\"> <div  class=\"col-xs-12 col-sm-12\" data-type=\"column\"> <p  class=\"\">Our team of seasoned cybersecurity professionals is dedicated to protecting what matters most to you. With years of industry experience, we deliver unmatched expertise and cutting-edge solutions.<\/p> <\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding col-padding-xs bg-color-white\"><div  class=\"row middle-sm\"> <div  class=\"col-xs-12 col-sm-fit icon-column\"><i  class=\"fa fa-cubes icon bordered round color2\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm v-spacing\"><h5  class=\"\">Comprehensive Services<\/h5><\/div> <\/div> <div  class=\"row\"> <div  class=\"col-xs-12 col-sm-12\" data-type=\"column\"> <p  class=\"\">From penetration testing and vulnerability assessments to managed security services and incident response, we offer a full spectrum of cybersecurity solutions.<\/p> <\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-4 col-padding col-padding-xs bg-color-white\"><div  class=\"row middle-sm\"> <div  class=\"col-xs-12 col-sm-fit icon-column\"><i  class=\"fa fa-area-chart icon bordered round color2\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm v-spacing\"><h5  class=\"\">Customized Protection<\/h5><\/div> <\/div> <div  class=\"row\"> <div  class=\"col-xs-12 col-sm-12\" data-type=\"column\"> <p  class=\"\">We understand that no two security needs are the same. That\u2019s why we provide personalized strategies and solutions designed specifically for your unique requirements.<\/p> <\/div> <\/div><\/div> <\/div><\/div> <\/div><div  id=\"overlappable-1\" data-label=\"Overlappable\" data-id=\"overlappable-7-mc\" data-export-id=\"overlappable-7-mc\" data-category=\"overlappable\" class=\"overlappable-7-mc content-section content-section-spacing\" data-overlap=\"true\"><div  class=\"gridContainer\"> <div  data-type=\"row\" class=\"row shadow\"><div  class=\"col-xs-12 col-sm-6 col-md-3 col-padding-small col-padding-small-xs bg-color-white\"> <div  class=\"text-center\"><div  class=\"col-xs-12 col-sm-fit space-bottom-small-xs\"> <i  class=\"fa icon fa-refresh large color7\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><h4  class=\"\">Penetration Testing<\/h4> <p  class=\"\">Simulating real-world cyberattacks to identify vulnerabilities in your systems, applications, or network infrastructure before malicious actors do.<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-6 col-md-3 col-padding-small col-padding-small-xs bg-color-white\"><div  class=\"text-center\"> <div  class=\"col-xs-12 col-sm-fit space-bottom-small-xs\"><i  class=\"fa icon fa-connectdevelop large color7\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><h4  class=\"\">Incident Response and Recovery<\/h4> <p  class=\"\">Rapid detection and mitigation of security breaches, followed by recovery processes to restore systems and data integrity while minimizing downtime.<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-6 col-md-3 col-padding-small col-padding-small-xs bg-color-white\"><div  class=\"text-center\"> <div  class=\"col-xs-12 col-sm-fit space-bottom-small-xs\"><i  class=\"fa icon fa-bullseye large color7\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><h4  class=\"\">Threat Monitoring and Management<\/h4> <p  class=\"\">Continuous monitoring of networks and systems to detect, analyze, and respond to potential threats in real time, ensuring proactive protection.<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-6 col-md-3 col-padding-small col-padding-small-xs bg-color-white\"><div  class=\"text-center\"> <div  class=\"col-xs-12 col-sm-fit space-bottom-small-xs\"><i  class=\"fa icon fa-male large color7\"><\/i><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><h4  class=\"\">Employee Security Awareness Training<\/h4> <p  class=\"\">Educating staff on recognizing phishing attempts, handling sensitive data securely, and following best practices to minimize human error as a security risk.<\/p><\/div> <\/div><\/div> <\/div><\/div> <\/div><div  id=\"about-1\" style=\"background-color: #ffffff;\" data-label=\"About\" data-id=\"about-images-right-section-mc\" data-export-id=\"about-images-right-section-mc\" data-category=\"about\" class=\"about-images-right-section content-section content-section-spacing\"><div  class=\"gridContainer\"> <div  class=\"row middle-sm text-center\"><div  class=\"col-sm-5 content-left-sm\" data-type=\"column\"> <h5  class=\"\">Cyber Security 101<\/h5> <h2  class=\"\" style=\"border-bottom-color: rgb(246, 0, 0);\">The Vital Role of Independent Cybersecurity Audits<\/h2> <p  class=\"\"><span  style=\"color: rgb(60, 66, 79);\">An independent cybersecurity audit provides an unbiased evaluation of your organization\u2019s security posture, identifying vulnerabilities and gaps that might be overlooked internally. These audits ensure compliance with industry standards, strengthen defenses against cyber threats, and offer actionable insights to enhance overall security. By engaging external experts, you gain a fresh perspective and validate your efforts, ensuring your systems are robust and resilient in an ever-evolving threat landscape.<\/span><\/p> <a  class=\"button color2\" href=\"https:\/\/chrisingram.guru\/index.php\/contact\" target=\"_self\" data-cp-link=\"1\" data-icon=\"\">GET STARTED NOW<\/a><\/div> <div  class=\"col-sm-7 space-bottom-xs\"><div  class=\"image-group-side-3-img\"> <img  decoding=\"async\" class=\"topimg shadow-large\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-15010.jpg\" title=\"cropped-15010.jpg\" alt=\"\"> <img  decoding=\"async\" class=\"rightimg shadow-large\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-846.jpg\" title=\"cropped-846.jpg\" alt=\"\"> <div  class=\"leftimg\"> <img  decoding=\"async\" class=\"shadow-large\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-62559.jpg\" title=\"cropped-62559.jpg\" alt=\"\"><\/div> <\/div><\/div> <\/div><\/div> <\/div><div  id=\"features-10\" style=\"background-color: #f5fafd;\" data-label=\"Features\" data-id=\"features-16-card-bordered\" data-export-id=\"features-16-card-bordered\" data-category=\"features\" class=\"features-16-card-bordered content-section content-section-spacing\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\" style=\"border-bottom-color: rgb(246, 0, 0);\">Strengthening Security &amp; Compliance: Proactive Risk Management<\/h2> <p  class=\"lead\">Ensure your organization\u2019s security framework is both resilient and compliant by identifying vulnerabilities and aligning policies with industry standards. A Vulnerability Assessment helps uncover weaknesses in your systems before attackers can exploit them, while a Policy and Compliance Review ensures your security practices meet regulatory requirements. Proactively addressing these areas strengthens your defense against cyber threats and enhances overall security posture.<\/p><\/div> <\/div> <div  class=\"row spaced-cols\" data-type=\"row\"> <div  class=\"col-xs-12 col-sm-6 col-md-4\"> <div  class=\"card no-padding bordered y-move\"> <img  decoding=\"async\" class=\"face\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-2147775417.jpg\" title=\"cropped-2147775417.jpg\" alt=\"\"> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs description-container\"> <h4  class=\"font-500\">Vulnerability Assessment<\/h4> <p  class=\"\">Identify and analyze weaknesses in your systems, networks, and applications that could be exploited by attackers. A thorough vulnerability assessment helps uncover security gaps, misconfigurations, and outdated software that threat actors may target. By conducting regular security audits, penetration testing, and risk analysis, organizations can proactively address potential entry points before they lead to breaches. Strengthening defenses through patch management, access controls, and network segmentation ensures a more resilient cybersecurity posture. Taking a proactive approach to identifying vulnerabilities not only protects critical assets but also helps maintain compliance with industry regulations and best practices.<\/p><\/div> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs read-more-container\"><a  class=\"read-more\" href=\"https:\/\/chrisingram.guru\/index.php\/services\" target=\"_self\" data-cp-link=\"1\">learn more<\/a><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-6 col-md-4\"><div  class=\"card no-padding bordered y-move\"> <img  decoding=\"async\" class=\"face\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-40810.jpg\" title=\"cropped-40810.jpg\" alt=\"\"> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs description-container\"> <h4  class=\"font-500\">Policy and Compliance Review<\/h4> <p  class=\"\">Evaluate the organization\u2019s adherence to industry standards and regulatory requirements, ensuring all policies align with best practices. Compliance with frameworks such as NIST, ISO 27001, HIPAA, and GDPR is essential for protecting sensitive data and avoiding legal penalties. Regular assessments help identify gaps in security policies, access controls, and data protection measures that may put the organization at risk. By implementing clear security protocols, conducting employee training, and maintaining thorough documentation, businesses can demonstrate their commitment to cybersecurity compliance. Ensuring alignment with industry standards not only reduces risk exposure but also builds trust with customers, stakeholders, and regulatory bodies.<\/p><\/div> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs read-more-container\"><a  class=\"read-more\" href=\"https:\/\/chrisingram.guru\/index.php\/services\" target=\"_self\" data-cp-link=\"1\">learn more<\/a><\/div> <\/div><\/div> <div  class=\"col-xs-12 col-sm-6 col-md-4\"><div  class=\"card no-padding bordered y-move\"> <img  decoding=\"async\" class=\"face\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-2149160781.jpg\" title=\"cropped-2149160781.jpg\" alt=\"\"> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs description-container\"> <h4  class=\"font-500\">Access Control and Privilege Management<\/h4> <p  class=\"\">Assess how access to sensitive data and systems is managed, ensuring that permissions are granted based on roles and responsibilities. Implementing a robust identity and access management (IAM) strategy helps prevent unauthorized access and reduces the risk of insider threats. Role-based access control (RBAC), multi-factor authentication (MFA), and the principle of least privilege (PoLP) ensure that users only have access to the resources necessary for their job functions. Regular audits of access logs, permission reviews, and automated access provisioning help organizations maintain security and compliance. Strengthening access control measures not only protects critical assets but also enhances operational efficiency by reducing unnecessary system exposure.<\/p><\/div> <div  data-type=\"column\" class=\"col-padding-small col-padding-small-xs read-more-container\"><a  class=\"read-more\" href=\"https:\/\/chrisingram.guru\/index.php\/services\" target=\"_self\" data-cp-link=\"1\">learn more<\/a><\/div> <\/div><\/div> <\/div><\/div> <\/div><div  data-label=\"Features\" data-id=\"features--1\" data-export-id=\"features-12\" data-category=\"features\" class=\"features-12 content-section content-section-spacing \" id=\"features-11\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\" style=\"border-bottom-color: rgb(246, 0, 0);\">Comprehensive Cybersecurity Audits: Securing Your Digital Landscape<\/h2> <p  class=\"lead\">A cybersecurity audit is a crucial step in safeguarding your organization\u2019s digital assets. It provides an in-depth assessment of your current security measures, identifies vulnerabilities, and ensures compliance with industry standards and regulations. By evaluating your infrastructure, policies, and practices, a cybersecurity audit helps you stay ahead of emerging threats while building a resilient security framework. This proactive approach not only protects sensitive data but also strengthens trust with your clients and stakeholders.<\/p><\/div> <\/div> <div  class=\"row spaced-cols\" data-type=\"row\"> <div  class=\"col-sm-6\"> <div  class=\"row space-bottom\"> <div  class=\"col-sm-fit icon-column\"> <i  class=\"fa icon fa-connectdevelop bordered round color6\"><\/i> <\/div> <div  class=\"col-sm\" data-type=\"column\"> <h5  class=\"color2\"><span  style=\"color: rgb(60, 66, 79);\">NETWORK SECURITY MONITORING<\/span><\/h5> <p  class=\"\">Proactively monitoring your network for threats is essential in preventing cyberattacks. Our security monitoring solutions provide real-time detection of suspicious activity, alerting your team to potential breaches before they escalate. We utilize advanced intrusion detection systems (IDS) and security information and event management (SIEM) tools to analyze traffic and identify anomalies, keeping your network secure.<\/p><\/div> <\/div><\/div> <div  class=\"col-sm-6\"><div  class=\"row space-bottom\"> <div  class=\"col-sm-fit icon-column\"><i  class=\"fa icon fa-codepen bordered round color6\"><\/i><\/div> <div  class=\"col-sm\" data-type=\"column\"><h5  class=\"color2\"><span  style=\"color: rgb(60, 66, 79);\">DATA ENCRYPTION &amp; PROTECTION<\/span><\/h5> <p  class=\"\">Sensitive data is a prime target for cybercriminals. Encryption ensures that even if data is intercepted, it remains unreadable to unauthorized users. We help businesses implement strong encryption protocols for data at rest and in transit, ensuring compliance with industry regulations and protecting critical information from breaches.<\/p><\/div> <\/div><\/div> <div  class=\"col-sm-6\"><div  class=\"row space-bottom\"> <div  class=\"col-sm-fit icon-column\"><i  class=\"fa icon fa-cube bordered round color6\"><\/i><\/div> <div  class=\"col-sm\" data-type=\"column\"><h5  class=\"color2\"><span  style=\"color: rgb(60, 66, 79);\">PHISHING &amp; SOCIAL ENGINEERING DEFENSE<\/span><\/h5> <p  class=\"\">Human error is one of the biggest cybersecurity risks. Cybercriminals use phishing emails, social engineering tactics, and impersonation attacks to steal credentials and gain access to sensitive systems. Our cybersecurity awareness training and advanced email filtering solutions help organizations identify and mitigate these threats before they cause damage.<\/p><\/div> <\/div><\/div> <div  class=\"col-sm-6\"><div  class=\"row space-bottom\"> <div  class=\"col-sm-fit icon-column\"><i  class=\"fa icon fa-database bordered round color6\"><\/i><\/div> <div  class=\"col-sm\" data-type=\"column\"><h5  class=\"color2\"><span  style=\"color: rgb(60, 66, 79);\">ACCESS CONTROL &amp; IDENTITY MANAGEMENT<\/span><\/h5> <p  class=\"\">Unauthorized access to critical systems can lead to devastating security breaches. Implementing strong identity and access management (IAM) protocols ensures that only authorized personnel have access to sensitive data and systems. We help businesses deploy multi-factor authentication (MFA), role-based access controls (RBAC), and zero-trust security frameworks to minimize risks.<\/p><\/div> <\/div><\/div> <\/div><\/div> <\/div><div  id=\"content-14\" style=\"background-color: #f5fafd;\" data-label=\"Content\" data-id=\"content-3\" data-export-id=\"content-3\" data-category=\"content\" class=\"content-3 content-section content-section-spacing\"><div > <div  class=\"row middle-xs\"><div  class=\"col-sm-7 full-col-left-padding full-col-right-padding\"> <div  class=\"row\"><div  data-type=\"column\" class=\"space-bottom-small content-title-col\"> <h5  class=\"\">CASE STUDY<\/h5> <h2  class=\"\" style=\"border-bottom-color: rgb(246, 0, 0);\">The Path to Cyber Defense&nbsp;<\/h2> <p  class=\"\">Effective cyber defense lies in a proactive, multi-layered approach that addresses threats before they become breaches. By combining advanced technology, strategic planning, and continuous vigilance, organizations can build a resilient defense framework. The secret to success in cybersecurity revolves around mastering these four critical areas:<\/p><\/div> <\/div> <div  class=\"row spaced-cols\" data-type=\"row\"> <div  class=\"col-xs-6\" data-type=\"column\"> <h5  class=\"\">Threat Intelligence<\/h5> <p  class=\"\">Stay ahead of attackers by leveraging real-time data and insights to identify, analyze, and mitigate potential threats.<\/p><\/div> <div  class=\"col-xs-6\" data-type=\"column\"><h5  class=\"\">Robust Security Infrastructure<\/h5> <p  class=\"\">Implement strong defenses, including firewalls, intrusion detection systems, and endpoint protection, to safeguard your digital assets.<\/p><\/div> <div  class=\"col-xs-6\" data-type=\"column\"><h5  class=\"\">Employee Training and Awareness<\/h5> <p  class=\"\">Equip your team with the knowledge to recognize and respond to cyber threats, reducing human error as a vulnerability.<\/p><\/div> <div  class=\"col-xs-6\" data-type=\"column\"><h5  class=\"\">Incident Response Preparedness<\/h5> <p  class=\"\">Develop and regularly test an incident response plan to ensure swift action in the event of a breach, minimizing damage and downtime.<\/p><\/div> <\/div><\/div> <div  class=\"col-sm-5 bg-image shadow-large-black revert-classes-holder\" data-bg=\"image\" style=\"background-image: url(&quot;https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-22976.jpg&quot;);\"><\/div><\/div> <\/div><\/div><div  data-label=\"Contact\" data-id=\"contact--1\" data-export-id=\"contact-5\" data-category=\"contact\" class=\"contact-5 content-section content-section-spacing\" id=\"contact-2\" style=\"background-color: rgb(245, 250, 253);\"><div  class=\"gridContainer\"> <div  class=\"row text-center\"><div  class=\"section-title-col\" data-type=\"column\"> <h2  class=\"\" style=\"border-bottom-color: rgb(246, 0, 0);\">Contact us<\/h2> <p  class=\"lead\">As technology advanced and integrated deep into our daily lives, AI driven cyber threats have become more sophisticated, directly targeting businesses, critical infrastructure, and personal data\u2013cybersecurity a necessity, not an option.<\/p><\/div> <\/div> <div  class=\"row middle-sm\"> <div  class=\"col-xs-12 col-sm-6 image-holder space-bottom-xs\"> <img  decoding=\"async\" src=\"https:\/\/chrisingram.guru\/wp-content\/uploads\/2025\/02\/cropped-tcmap.png\" title=\"cropped-tcmap.png\" alt=\"\"><\/div> <div  class=\"col-xs-12 col-sm-6\"><div  class=\"row middle-sm\"> <div  data-type=\"column\" class=\"col-xs-12 space-bottom-small\"><h3  class=\"color1\">Get in touch<\/h3><\/div> <\/div> <div  class=\"row middle-sm\" data-type=\"row\"> <div  class=\"col-xs-12 space-bottom-small\"> <div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 col-sm-fit label-col\"> <h5  class=\"\">Address:<\/h5><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><p  class=\"\">2119 Riverwalk Drive<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 space-bottom-small\"><div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 col-sm-fit label-col\"><h5  class=\"\">Phone:<\/h5><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><p  class=\"\">\u202a(405) 754-1550<\/p><\/div> <\/div><\/div> <div  class=\"col-xs-12 space-bottom-small\"><div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 col-sm-fit label-col\"><h5  class=\"\">Email:<\/h5><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><a  href=\"mailto:\" class=\"\" target=\"_self\" data-cp-link=\"1\">query@chrisingram.guru<\/a><\/div> <\/div><\/div> <div  class=\"col-xs-12 space-bottom-small\"><div  class=\"row\"> <div  data-type=\"column\" class=\"col-xs-12 col-sm-fit label-col\"><h5  class=\"\">Follow us:<\/h5><\/div> <div  data-type=\"column\" class=\"col-xs-12 col-sm\"><div  data-type=\"group\" class=\"\"> <a  href=\"#\"><i  class=\"color1 fa icon fa-twitter-square small\"><\/i><\/a> <a  href=\"#\"><i  class=\"color1 fa icon fa-facebook-square small\"><\/i><\/a> <a  href=\"#\"><i  class=\"color1 fa icon fa-instagram small\"><\/i><\/a> <a  href=\"#\"><i  class=\"color1 fa icon fa-rss small\"><\/i><\/a><\/div> <\/div><\/div> <\/div><\/div> <\/div><\/div> <\/div><\/div>","protected":false},"excerpt":{"rendered":"<p>Expertise You Can Trust Our team of seasoned cybersecurity professionals is dedicated to protecting what matters most to you. With years of industry experience, we deliver unmatched expertise and cutting-edge solutions. Comprehensive Services From penetration testing and vulnerability assessments to managed security services and incident response, we offer a full spectrum of cybersecurity solutions. Customized&hellip; <br \/> <a class=\"read-more\" href=\"https:\/\/chrisingram.guru\/\">Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"page-templates\/homepage.php","meta":{"footnotes":""},"class_list":["post-14","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/pages\/14","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/comments?post=14"}],"version-history":[{"count":10,"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/pages\/14\/revisions"}],"predecessor-version":[{"id":883,"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/pages\/14\/revisions\/883"}],"wp:attachment":[{"href":"https:\/\/chrisingram.guru\/index.php\/wp-json\/wp\/v2\/media?parent=14"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}