{"id":2954,"date":"2019-01-23T13:25:07","date_gmt":"2019-01-23T19:25:07","guid":{"rendered":"https:\/\/www.kraftgrp.com\/?p=2954"},"modified":"2019-01-23T13:25:07","modified_gmt":"2019-01-23T19:25:07","slug":"data-breach-next-steps","status":"publish","type":"post","link":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","title":{"rendered":"Data Breach – What are the next steps?"},"content":{"rendered":"

Data Breach? What Are The Next Steps?<\/strong><\/p>\n

Data breach. It’s the two-word combination you never want to hear spoken within your healthcare organization. Whether you’re a doctor’s office, a hospital, or another healthcare facility, you don’t want to become a victim of digital theft. However, if you do become a victim, you need to know what your next steps are going to be.<\/p>\n

The Average Data Breach<\/strong><\/p>\n

One of the first things that you need to know is that most data breaches and cyber-attacks are on small to medium-sized businesses. Although you hear about large companies getting hit, it’s only because they make better news. Small businesses don’t have sophisticated IT security in place, making them an easier target.<\/p>\n

Any time-sensitive information is stolen from an internal server without the authorization of the owner, it is identified as a data breach. The level of information stolen can vary from breach to breach. In some instances, it is only a small portion of the database and in other instances, it is the entire database, complete with personal information, credit cards, and other data that can pose serious problems to those who have had their information stolen from your database.<\/p>\n

Recover Stolen Data<\/strong><\/p>\n

The goal will be to recover any stolen data so that it does not end up on the dark web. However, this may not be possible based on the level of cyber-attack.<\/p>\n

An investigation will need to be launched to understand how the breach occurred. You’ll need to know what systems were affected as well as what data has been compromised. In order to carry out the investigation, you will need to hire an external security incident response specialists. This will ensure that the issue is addressed so that you can then learn about how to fix it.<\/p>\n

You will also need to contain the breach so that it doesn’t continue to cause you problems.<\/p>\n

In many instances, the investigation will cause operations to cease until the IT issues are addressed.<\/p>\n

Report the Data Breach<\/strong><\/p>\n

The breach will need to be reported to several different entities. If you’re in the healthcare industry, you may be in violation of HIPAA as a result of the breach. In this case, HIPAA has requirements involving reporting the breach to the affected individuals,\u00a0HHS (US Department of Health & Human Services)<\/a>, and potentially even the media.<\/p>\n

A number of individuals need to know about the data breach so that they can take preventative measures towards securing all of their data. For example, if people know that their credit card was part of the stolen data, they can contact the bank in order to have a new credit card issued. It’s best to seek counsel to determine who needs to know and when they need to be notified.<\/p>\n

The victims are likely to have a number of questions so you will need to invest the time and resources to be able to address everything effectively.<\/p>\n

Local authorities (and potentially even the federal) should also be informed of the data breach because hacking personal, financial, or business data is against the law. If the parties responsible for hacking the data are caught, they can face serious charges.<\/p>\n

Protect Your Business<\/strong><\/p>\n

Once you have finished cleaning up the mess of the data breach, you need to create an action plan so that you don’t encounter any future data breaches. You want to make sure that you are payment card industry (PCI) compliant. Additionally, you want to look at the level of security that you have in place and make some adjustments.<\/p>\n

Various\u00a0IT services<\/a>\u00a0can be incorporated into your healthcare facility so that you can improve IT functionality. A variety of cyber security solutions are available to help you establish a safer online working environment.<\/p>\n

Where you store your data will determine the different solutions that are created for you. For example, you may have some information on a private server and other information may be located in the cloud.<\/p>\n

A cybersecurity assessment will make it easier to learn about existing issues as well as any potential vulnerabilities. This will make it easier to address problems and take the necessary precautions to prevent another database.<\/p>\n

Once you have a better solution in place, you can then focus on sufficient maintenance and monitoring.<\/p>\n

It’s important to remember that there is no “one and done” solution. Monitoring is an ongoing process. You also need to make sure that your systems are being updated regularly so that they are capable of protecting against the various threats. Remote monitoring will also ensure that you aren’t the one personally responsible for looking after your system. If there is any kind of issue, it can be addressed before any hacker notices the vulnerability.<\/p>\n

You need to do everything you can to protect your business. Particularly within the healthcare industry, you need to keep your patients’ information safe. If there is a data breach, it can cost you money and hurt your reputation. Ideally, you can work with IT professionals to safeguard your business before you ever find out what it’s like to be a victim.<\/p>\n

When you want to learn more about data breaches and how to protect yourself, contact the\u00a0Kraft Technology Group<\/a>. We can identify the technology and strategize your IT security to ensure that you are more secure to ward off future data breaches.<\/p>\n

 <\/p>\n

 <\/p>\n","protected":false},"excerpt":{"rendered":"

Data Breach? What Are The Next Steps? Data breach. It’s the two-word combination you never want to hear spoken within your healthcare organization. Whether you’re a doctor’s office, a hospital, or another […]<\/p>\n","protected":false},"author":1,"featured_media":2955,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","_mbp_gutenberg_autopost":false,"footnotes":""},"categories":[17],"tags":[],"class_list":["post-2954","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog"],"acf":[],"yoast_head":"\nSteps to Take After a Data Breach - Kraft Technology Group<\/title>\n<meta name=\"description\" content=\"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Breach - What are the next steps?\" \/>\n<meta property=\"og:description\" content=\"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\" \/>\n<meta property=\"og:site_name\" content=\"KTG\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/krafttechgroup\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-01-23T19:25:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Brian Gray\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/krafttechgroup\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Brian Gray\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\"},\"author\":{\"name\":\"Brian Gray\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\"},\"headline\":\"Data Breach – What are the next steps?\",\"datePublished\":\"2019-01-23T19:25:07+00:00\",\"dateModified\":\"2019-01-23T19:25:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\"},\"wordCount\":905,\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg\",\"articleSection\":[\"Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\",\"url\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\",\"name\":\"Steps to Take After a Data Breach - Kraft Technology Group\",\"isPartOf\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg\",\"datePublished\":\"2019-01-23T19:25:07+00:00\",\"dateModified\":\"2019-01-23T19:25:07+00:00\",\"description\":\"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg\",\"width\":1000,\"height\":667},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.kraftgrp.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Breach – What are the next steps?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.kraftgrp.com\/#website\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"name\":\"KTG\",\"description\":\"Nashville IT Support & IT Services\",\"publisher\":{\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.kraftgrp.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Organization\",\"Place\"],\"@id\":\"https:\/\/www.kraftgrp.com\/#organization\",\"name\":\"Kraft Technology Group\",\"url\":\"https:\/\/www.kraftgrp.com\/\",\"logo\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo\"},\"image\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo\"},\"address\":{\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-place-address\"},\"geo\":{\"@type\":\"GeoCoordinates\",\"latitude\":\"36.1941464\",\"longitude\":\"-86.807833\"},\"telephone\":[\"(615) 600-4411\"],\"openingHoursSpecification\":[{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Sunday\",\"Saturday\"],\"opens\":\"00:00\",\"closes\":\"00:00\"},{\"@type\":\"OpeningHoursSpecification\",\"dayOfWeek\":[\"Monday\",\"Tuesday\",\"Wednesday\",\"Thursday\",\"Friday\"],\"opens\":\"09:00\",\"closes\":\"17:00\"}],\"email\":\"info@kraftgrp.com\",\"faxNumber\":\"(615) 600-4411\",\"areaServed\":\"Tennessee\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36\",\"name\":\"Brian Gray\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g\",\"caption\":\"Brian Gray\"},\"description\":\"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.\",\"sameAs\":[\"https:\/\/www.facebook.com\/krafttechgroup\/\",\"https:\/\/www.instagram.com\/kraft.tech.group\/\",\"https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup\",\"https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos\"]},{\"@type\":\"PostalAddress\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-place-address\",\"streetAddress\":\"555 Great Circle, Road Nashville\",\"addressLocality\":\"Nashville\",\"postalCode\":\"37228\",\"addressRegion\":\"TN\",\"addressCountry\":\"US\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo\",\"url\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"contentUrl\":\"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png\",\"width\":504,\"height\":100,\"caption\":\"Kraft Technology Group\"}]}<\/script>\n<meta name=\"geo.placename\" content=\"Nashville\" \/>\n<meta name=\"geo.position\" content=\"36.1941464;-86.807833\" \/>\n<meta name=\"geo.region\" content=\"United States (US)\" \/>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Steps to Take After a Data Breach - Kraft Technology Group","description":"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","og_locale":"en_US","og_type":"article","og_title":"Data Breach - What are the next steps?","og_description":"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.","og_url":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","og_site_name":"KTG","article_author":"https:\/\/www.facebook.com\/krafttechgroup\/","article_published_time":"2019-01-23T19:25:07+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg","type":"image\/jpeg"}],"author":"Brian Gray","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/krafttechgroup","twitter_misc":{"Written by":"Brian Gray","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#article","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/"},"author":{"name":"Brian Gray","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36"},"headline":"Data Breach – What are the next steps?","datePublished":"2019-01-23T19:25:07+00:00","dateModified":"2019-01-23T19:25:07+00:00","mainEntityOfPage":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/"},"wordCount":905,"publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"image":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg","articleSection":["Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","url":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/","name":"Steps to Take After a Data Breach - Kraft Technology Group","isPartOf":{"@id":"https:\/\/www.kraftgrp.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage"},"image":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage"},"thumbnailUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg","datePublished":"2019-01-23T19:25:07+00:00","dateModified":"2019-01-23T19:25:07+00:00","description":"No company wants to fall victim to a data breach. That's why knowing the steps to take after a data breach can help mitigate the damage caused by the event.","breadcrumb":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.kraftgrp.com\/data-breach-next-steps\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#primaryimage","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/01\/Data-Breach-What-Now-Kraft-Technology-Group.jpeg","width":1000,"height":667},{"@type":"BreadcrumbList","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.kraftgrp.com\/"},{"@type":"ListItem","position":2,"name":"Data Breach – What are the next steps?"}]},{"@type":"WebSite","@id":"https:\/\/www.kraftgrp.com\/#website","url":"https:\/\/www.kraftgrp.com\/","name":"KTG","description":"Nashville IT Support & IT Services","publisher":{"@id":"https:\/\/www.kraftgrp.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.kraftgrp.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Organization","Place"],"@id":"https:\/\/www.kraftgrp.com\/#organization","name":"Kraft Technology Group","url":"https:\/\/www.kraftgrp.com\/","logo":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo"},"image":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo"},"address":{"@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-place-address"},"geo":{"@type":"GeoCoordinates","latitude":"36.1941464","longitude":"-86.807833"},"telephone":["(615) 600-4411"],"openingHoursSpecification":[{"@type":"OpeningHoursSpecification","dayOfWeek":["Sunday","Saturday"],"opens":"00:00","closes":"00:00"},{"@type":"OpeningHoursSpecification","dayOfWeek":["Monday","Tuesday","Wednesday","Thursday","Friday"],"opens":"09:00","closes":"17:00"}],"email":"info@kraftgrp.com","faxNumber":"(615) 600-4411","areaServed":"Tennessee"},{"@type":"Person","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/d64e95076b360a71439fd86beec62c36","name":"Brian Gray","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/43191bd1c1538b235477a17090600eaf?s=96&d=mm&r=g","caption":"Brian Gray"},"description":"Brian Gray, MCP, is the President at Kraft Technology Group, LLC (KTG), an affiliate of KraftCPAs PLLC. Within his role, Brian is responsible for all aspects of service delivery to our clients. Brian has a decade of experience working for managed service providers. He has worked with clients in a variety of industries, including financial services, accounting, legal, healthcare, manufacturing, and retail.","sameAs":["https:\/\/www.facebook.com\/krafttechgroup\/","https:\/\/www.instagram.com\/kraft.tech.group\/","https:\/\/x.com\/https:\/\/twitter.com\/krafttechgroup","https:\/\/www.youtube.com\/channel\/UCtyhZQ69LpOjdaHg6HxNwQg\/videos"]},{"@type":"PostalAddress","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-place-address","streetAddress":"555 Great Circle, Road Nashville","addressLocality":"Nashville","postalCode":"37228","addressRegion":"TN","addressCountry":"US"},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.kraftgrp.com\/data-breach-next-steps\/#local-main-organization-logo","url":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","contentUrl":"https:\/\/www.kraftgrp.com\/wp-content\/uploads\/2019\/11\/Nashville-IT-Company.png","width":504,"height":100,"caption":"Kraft Technology Group"}]},"geo.placename":"Nashville","geo.position":{"lat":"36.1941464","long":"-86.807833"},"geo.region":"United States (US)"},"_links":{"self":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2954","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/comments?post=2954"}],"version-history":[{"count":0,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/posts\/2954\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media\/2955"}],"wp:attachment":[{"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/media?parent=2954"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/categories?post=2954"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.kraftgrp.com\/wp-json\/wp\/v2\/tags?post=2954"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}