{"id":827,"date":"2016-04-27T10:42:00","date_gmt":"2016-04-27T14:42:00","guid":{"rendered":"https:\/\/assetworks2stg.wpengine.com\/eam\/?p=827"},"modified":"2023-04-06T10:44:44","modified_gmt":"2023-04-06T14:44:44","slug":"eam-secure-city-enterprise-asset-management-data","status":"publish","type":"post","link":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/","title":{"rendered":"How Secure is Your City&#8217;s Enterprise Asset Management Data?"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"827\" class=\"elementor elementor-827\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-e9cd056 e-flex e-con-boxed e-con e-parent\" data-id=\"e9cd056\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-ea2866e elementor-widget elementor-widget-text-editor\" data-id=\"ea2866e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<div class=\"fusion-text fusion-text-1 fusion-text-no-margin\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-0 fusion_builder_column_1_1 1_1 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\"><div class=\"fusion-text fusion-text-1\"><div class=\"fusion-text fusion-text-8\"><div class=\"fusion-text fusion-text-1\">\u00a0<\/div><div class=\"fusion-text fusion-text-2\"><p>Unfortunately, these days, it\u2019s not uncommon news to hear of a city or county that has become the victim of a cyberattack. Ultimately, this can mean their systems are down for days, heavy costs to free ransomed data or to hire experts to clean it out and a reduced perception in the public\u2019s eye. It may seem inevitable \u2013 our security can\u2019t possibly protect against any all security threats that may come up.<\/p><p>In the world of cybersecurity, threat development and response may feel like a game of cat and mouse. First, encryptions, protocols and good employee instruction are used to keep sensitive information safe. Eventually, security becomes lax or a hacker comes along with impressive skill and the encryption is broken. In response, data security experts patch the intrusion (if it was a software weakness), and work to develop an even better encryption.<\/p><p>Some security measures are better than others. Some organizations and institutions follow government guidelines in ensuring that their servers, networks and sensitive data are encrypted at the highest level available. With this level of security, government agencies, police departments, cities and counties will trust these organizations to safeguard customer, community or employee data.<\/p><p>In your city or county, you may not feel like you have the same level of sensitive data that may come along with social security numbers, credit cards and personal addresses. All the same, your asset information, capital budgets and employee data are critical to your operations and could potentially lead to criminal activity if it were in the wrong hands. As it stands, any interruption to access to your data could result in significant repercussions for your community. As asset information cannot be logged, datasets will be incomplete and budgets will be inaccurate. If work orders cannot be completed, certain critical repairs may go unfinished, creating hazards in your community.<\/p><p>Having a software system that guarantees secure access to your data and maximum uptime is crucial to your success and operations. AssetWorks Enterprise Asset Management (EAM) software adheres to the strictest governmental standards for data security, redundancy and uptime. As a result, you may experience unparalleled comfort in knowing that your community\u2019s sensitive information is secure and available to authorized individuals at a moment\u2019s notice.<\/p><\/div><\/div><\/div><\/div><\/div><div class=\"fusion-layout-column fusion_builder_column fusion-builder-column-1 fusion_builder_column_1_3 1_3 fusion-flex-column\"><div class=\"fusion-column-wrapper fusion-flex-justify-content-flex-start fusion-content-layout-column\">\u00a0<\/div><\/div><\/div><\/div><\/div><\/div>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u00a0 Unfortunately, these days, it\u2019s not uncommon news to hear of a city or county that has become the victim of a cyberattack. Ultimately, this can mean their systems are down for days, heavy costs to free ransomed data or to hire experts to clean it out and a reduced perception in the public\u2019s eye&#8230;.<\/p>\n","protected":false},"author":6,"featured_media":828,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"content-type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[20],"tags":[],"post_folder":[33],"class_list":["post-827","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>How Secure is Your City&#039;s Enterprise Asset Management Data? | AssetWorks<\/title>\n<meta name=\"description\" content=\"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure is Your City&#039;s Enterprise Asset Management Data? | AssetWorks\" \/>\n<meta property=\"og:description\" content=\"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/\" \/>\n<meta property=\"og:site_name\" content=\"Enterprise Asset Management\" \/>\n<meta property=\"article:published_time\" content=\"2016-04-27T14:42:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-06T14:44:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"724\" \/>\n\t<meta property=\"og:image:height\" content=\"483\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"maryellenkennedy\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"maryellenkennedy\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/\"},\"author\":{\"name\":\"maryellenkennedy\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#\\\/schema\\\/person\\\/6e78489f09135e719353ee3162247368\"},\"headline\":\"How Secure is Your City&#8217;s Enterprise Asset Management Data?\",\"datePublished\":\"2016-04-27T14:42:00+00:00\",\"dateModified\":\"2023-04-06T14:44:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/\"},\"wordCount\":387,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#\\\/schema\\\/person\\\/75100f85eaf79ba22767fde039694a4d\"},\"image\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2023\\\/04\\\/iStock-849158068.jpg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/\",\"url\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/\",\"name\":\"How Secure is Your City's Enterprise Asset Management Data? | AssetWorks\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2023\\\/04\\\/iStock-849158068.jpg\",\"datePublished\":\"2016-04-27T14:42:00+00:00\",\"dateModified\":\"2023-04-06T14:44:44+00:00\",\"description\":\"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2023\\\/04\\\/iStock-849158068.jpg\",\"contentUrl\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2023\\\/04\\\/iStock-849158068.jpg\",\"width\":724,\"height\":483},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/blog\\\/eam-secure-city-enterprise-asset-management-data\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"EAM\",\"item\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Secure is Your City&#8217;s Enterprise Asset Management Data?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#website\",\"url\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/\",\"name\":\"Enterprise Asset Management\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#\\\/schema\\\/person\\\/75100f85eaf79ba22767fde039694a4d\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#\\\/schema\\\/person\\\/75100f85eaf79ba22767fde039694a4d\",\"name\":\"assetworks2dev\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cropped-Logo_AssetWorks_withouttagline@2x-2.png\",\"url\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cropped-Logo_AssetWorks_withouttagline@2x-2.png\",\"contentUrl\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cropped-Logo_AssetWorks_withouttagline@2x-2.png\",\"width\":410,\"height\":52,\"caption\":\"assetworks2dev\"},\"logo\":{\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/wp-content\\\/uploads\\\/sites\\\/8\\\/2022\\\/11\\\/cropped-Logo_AssetWorks_withouttagline@2x-2.png\"},\"sameAs\":[\"https:\\\/\\\/www.assetworks.com\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/#\\\/schema\\\/person\\\/6e78489f09135e719353ee3162247368\",\"name\":\"maryellenkennedy\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g\",\"caption\":\"maryellenkennedy\"},\"url\":\"https:\\\/\\\/www.assetworks.com\\\/eam\\\/author\\\/maryellenkennedy\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Secure is Your City's Enterprise Asset Management Data? | AssetWorks","description":"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/","og_locale":"en_US","og_type":"article","og_title":"How Secure is Your City's Enterprise Asset Management Data? | AssetWorks","og_description":"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.","og_url":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/","og_site_name":"Enterprise Asset Management","article_published_time":"2016-04-27T14:42:00+00:00","article_modified_time":"2023-04-06T14:44:44+00:00","og_image":[{"width":724,"height":483,"url":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg","type":"image\/jpeg"}],"author":"maryellenkennedy","twitter_card":"summary_large_image","twitter_misc":{"Written by":"maryellenkennedy","Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#article","isPartOf":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/"},"author":{"name":"maryellenkennedy","@id":"https:\/\/www.assetworks.com\/eam\/#\/schema\/person\/6e78489f09135e719353ee3162247368"},"headline":"How Secure is Your City&#8217;s Enterprise Asset Management Data?","datePublished":"2016-04-27T14:42:00+00:00","dateModified":"2023-04-06T14:44:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/"},"wordCount":387,"commentCount":0,"publisher":{"@id":"https:\/\/www.assetworks.com\/eam\/#\/schema\/person\/75100f85eaf79ba22767fde039694a4d"},"image":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg","articleSection":["Blog"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/","url":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/","name":"How Secure is Your City's Enterprise Asset Management Data? | AssetWorks","isPartOf":{"@id":"https:\/\/www.assetworks.com\/eam\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#primaryimage"},"image":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg","datePublished":"2016-04-27T14:42:00+00:00","dateModified":"2023-04-06T14:44:44+00:00","description":"In the world of data cybersecurity, threat development and response may feel like a game of cat and mouse.","breadcrumb":{"@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#primaryimage","url":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg","contentUrl":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2023\/04\/iStock-849158068.jpg","width":724,"height":483},{"@type":"BreadcrumbList","@id":"https:\/\/www.assetworks.com\/eam\/blog\/eam-secure-city-enterprise-asset-management-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"EAM","item":"https:\/\/www.assetworks.com\/eam\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/www.assetworks.com\/eam\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"How Secure is Your City&#8217;s Enterprise Asset Management Data?"}]},{"@type":"WebSite","@id":"https:\/\/www.assetworks.com\/eam\/#website","url":"https:\/\/www.assetworks.com\/eam\/","name":"Enterprise Asset Management","description":"","publisher":{"@id":"https:\/\/www.assetworks.com\/eam\/#\/schema\/person\/75100f85eaf79ba22767fde039694a4d"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.assetworks.com\/eam\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.assetworks.com\/eam\/#\/schema\/person\/75100f85eaf79ba22767fde039694a4d","name":"assetworks2dev","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2022\/11\/cropped-Logo_AssetWorks_withouttagline@2x-2.png","url":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2022\/11\/cropped-Logo_AssetWorks_withouttagline@2x-2.png","contentUrl":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2022\/11\/cropped-Logo_AssetWorks_withouttagline@2x-2.png","width":410,"height":52,"caption":"assetworks2dev"},"logo":{"@id":"https:\/\/www.assetworks.com\/eam\/wp-content\/uploads\/sites\/8\/2022\/11\/cropped-Logo_AssetWorks_withouttagline@2x-2.png"},"sameAs":["https:\/\/www.assetworks.com"]},{"@type":"Person","@id":"https:\/\/www.assetworks.com\/eam\/#\/schema\/person\/6e78489f09135e719353ee3162247368","name":"maryellenkennedy","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/30a92e891c60644bcc7fd948300f7dc4be97f3e396aa454c7189795845a3f5e9?s=96&d=mm&r=g","caption":"maryellenkennedy"},"url":"https:\/\/www.assetworks.com\/eam\/author\/maryellenkennedy\/"}]}},"_links":{"self":[{"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/posts\/827","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/comments?post=827"}],"version-history":[{"count":0,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/posts\/827\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/media\/828"}],"wp:attachment":[{"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/media?parent=827"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/categories?post=827"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/tags?post=827"},{"taxonomy":"post_folder","embeddable":true,"href":"https:\/\/www.assetworks.com\/eam\/wp-json\/wp\/v2\/post_folder?post=827"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}