{"id":734,"date":"2025-08-12T09:54:25","date_gmt":"2025-08-12T09:54:25","guid":{"rendered":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/here-are-five-seo-friendly-blog-title-options-top-pick-first\/"},"modified":"2025-10-01T16:04:04","modified_gmt":"2025-10-01T16:04:04","slug":"why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch","status":"publish","type":"post","link":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/","title":{"rendered":"Why passwordless authentication is becoming essential \u2014 and how to make the switch"},"content":{"rendered":"<p>Why passwordless authentication is becoming essential \u2014 and how to make the switch<\/p>\n<p>Passwords remain one of the weakest links in digital security. Relying on users to create, remember, and rotate complex passwords creates friction and exposes organizations to phishing, credential stuffing, and account takeover. Passwordless authentication delivers stronger security and smoother user experiences by replacing passwords with cryptographic credentials, biometrics, or device-based factors.<\/p>\n<p>What passwordless means<br \/>Passwordless authentication uses something you have (a device or cryptographic key), something you are (biometrics), or something you do (behavioral factors) instead of a typed password. Modern implementations rely on open standards like WebAuthn and FIDO2 to provide phishing-resistant, public-key based authentication that works across browsers and platforms.<\/p>\n<p>Key benefits<br \/>&#8211; Phishing resistance: Public-key credentials can\u2019t be replayed or phished the way passwords can.<br \/>&#8211; Better UX: Faster sign-ins with biometrics, security keys, or device-based approvals reduce login friction and support higher conversion.<br \/>&#8211; Lower support costs: Fewer password resets translate to measurable reductions in help-desk tickets and downtime.<br \/>&#8211; Privacy-friendly: Biometric data is typically stored locally on the device, not centrally, reducing breach impact.<br \/>&#8211; Compliance alignment: Stronger authentication helps meet regulatory expectations for risk-based access and MFA.<\/p>\n<p>Common passwordless approaches<br \/>&#8211; Passkeys and WebAuthn: Passkeys are FIDO-compliant credentials that sync across a user\u2019s devices via platform account backups or secure cloud sync. WebAuthn provides browser APIs to authenticate using these credentials.<br \/>&#8211; Biometric device authentication: Fingerprint or face sensors unlock private keys on the device and authenticate to services without exposing biometric data externally.<br \/>&#8211; Hardware security keys: USB, NFC, or Bluetooth security keys provide a high assurance option for enterprise and high-risk users.<br \/>&#8211; One-time links or codes: Email or magic links can be used for low-risk flows, though they are less resistant to targeted attacks than cryptographic methods.<\/p>\n<p>Implementation checklist<br \/>1. Audit authentication flows: Map all places passwords are used \u2014 web, mobile, APIs, and legacy systems.<\/p>\n<p><img decoding=\"async\" width=\"32%\" style=\"float: right; margin: 0 0 10px 15px; border-radius: 8px;\" src=\"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&#038;se=2025-08-12T10%3A54%3A19Z&#038;sp=r&#038;sv=2024-08-04&#038;sr=b&#038;rscd=inline&#038;rsct=image\/png&#038;skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&#038;sktid=a48cca56-e6da-484e-a814-9c849652bcb3&#038;skt=2025-08-11T18%3A19%3A41Z&#038;ske=2025-08-12T18%3A19%3A41Z&#038;sks=b&#038;skv=2024-08-04&#038;sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D\" alt=\"Tech image\"><\/p>\n<p>2. <\/p>\n<p>Choose standards-first solutions: Prioritize FIDO2\/WebAuthn-compatible providers or libraries to ensure cross-platform interoperability.<br \/>3. Pilot with real users: Start with a subset of users or a low-risk application to test device compatibility, sync behavior, and help-desk impact.<br \/>4. Integrate with identity platforms: Connect passwordless methods to SSO or identity providers so credentials can be managed centrally and policies enforced.<br \/>5. Build recovery and fallback options: Offer secure account recovery (multi-step verification, trusted devices) and fallback flows for lost devices.<br \/>6. Train users and support staff: Clear guidance reduces confusion and support requests; show how to register devices, add backups, and recover access.<br \/>7. Monitor and iterate: Track successful authentications, fallback rates, and support tickets to refine the rollout.<\/p>\n<p>Enterprise considerations<br \/>Adopting passwordless at scale requires attention to device management, key lifecycle, and regulatory obligations. Bring-your-own-device scenarios need policies for lost-device revocation. For regulated sectors, document how credentials are stored, how recovery is handled, and how access is audited.<\/p>\n<p>Next steps to move forward<br \/>Evaluate your most frequent password-based pain points and choose a standards-compliant path early. A phased approach \u2014 pilot, expand, enforce \u2014 balances user experience and security while minimizing disruption. Organizations that shift to passwordless will reduce risk, lower operational costs, and offer users a faster, more secure sign-in experience.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Why passwordless authentication is becoming essential \u2014 and how to make the switch Passwords remain one of the weakest links in digital security. Relying on users to create, remember, and rotate complex passwords creates friction and exposes organizations to phishing, credential stuffing, and account takeover. Passwordless authentication delivers stronger security and smoother user experiences by [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[],"class_list":["post-734","post","type-post","status-publish","format-standard","hentry","category-tech"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.0 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech\" \/>\n<meta property=\"og:description\" content=\"Why passwordless authentication is becoming essential \u2014 and how to make the switch Passwords remain one of the weakest links in digital security. Relying on users to create, remember, and rotate complex passwords creates friction and exposes organizations to phishing, credential stuffing, and account takeover. Passwordless authentication delivers stronger security and smoother user experiences by [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/\" \/>\n<meta property=\"og:site_name\" content=\"Heard in Tech\" \/>\n<meta property=\"article:published_time\" content=\"2025-08-12T09:54:25+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-10-01T16:04:04+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D\" \/>\n<meta name=\"author\" content=\"Morgan Blake\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Morgan Blake\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/\",\"url\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/\",\"name\":\"Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech\",\"isPartOf\":{\"@id\":\"https:\/\/heardintech.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D\",\"datePublished\":\"2025-08-12T09:54:25+00:00\",\"dateModified\":\"2025-10-01T16:04:04+00:00\",\"author\":{\"@id\":\"https:\/\/heardintech.com\/#\/schema\/person\/f8fcdb7c54e1055e21f72cd6391c8e02\"},\"breadcrumb\":{\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage\",\"url\":\"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D\",\"contentUrl\":\"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/heardintech.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why passwordless authentication is becoming essential \u2014 and how to make the switch\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/heardintech.com\/#website\",\"url\":\"https:\/\/heardintech.com\/\",\"name\":\"Heard in Tech\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/heardintech.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/heardintech.com\/#\/schema\/person\/f8fcdb7c54e1055e21f72cd6391c8e02\",\"name\":\"Morgan Blake\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/heardintech.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c47cf329501de15b9ec60ff149016fd745312ad424eb0e43e64f6797db661fb5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c47cf329501de15b9ec60ff149016fd745312ad424eb0e43e64f6797db661fb5?s=96&d=mm&r=g\",\"caption\":\"Morgan Blake\"},\"sameAs\":[\"https:\/\/heardintech.com\"],\"url\":\"https:\/\/heardintech.com\/index.php\/author\/admin_uz048z5b\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/","og_locale":"en_US","og_type":"article","og_title":"Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech","og_description":"Why passwordless authentication is becoming essential \u2014 and how to make the switch Passwords remain one of the weakest links in digital security. Relying on users to create, remember, and rotate complex passwords creates friction and exposes organizations to phishing, credential stuffing, and account takeover. Passwordless authentication delivers stronger security and smoother user experiences by [&hellip;]","og_url":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/","og_site_name":"Heard in Tech","article_published_time":"2025-08-12T09:54:25+00:00","article_modified_time":"2025-10-01T16:04:04+00:00","og_image":[{"url":"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D"}],"author":"Morgan Blake","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Morgan Blake","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/","url":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/","name":"Why passwordless authentication is becoming essential \u2014 and how to make the switch - Heard in Tech","isPartOf":{"@id":"https:\/\/heardintech.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage"},"image":{"@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage"},"thumbnailUrl":"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D","datePublished":"2025-08-12T09:54:25+00:00","dateModified":"2025-10-01T16:04:04+00:00","author":{"@id":"https:\/\/heardintech.com\/#\/schema\/person\/f8fcdb7c54e1055e21f72cd6391c8e02"},"breadcrumb":{"@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#primaryimage","url":"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D","contentUrl":"https:\/\/oaidalleapiprodscus.blob.core.windows.net\/private\/org-jltXC0vfqLI5qGuZhir6BCID\/user-oCfR823xRyTS7OidwihFpXcP\/img-KE07fNmku0oh6Fax83vKuFvY.png?st=2025-08-12T08%3A54%3A19Z&se=2025-08-12T10%3A54%3A19Z&sp=r&sv=2024-08-04&sr=b&rscd=inline&rsct=image\/png&skoid=ed3ea2f9-5e38-44be-9a1b-7c1e65e4d54f&sktid=a48cca56-e6da-484e-a814-9c849652bcb3&skt=2025-08-11T18%3A19%3A41Z&ske=2025-08-12T18%3A19%3A41Z&sks=b&skv=2024-08-04&sig=RPjtBFYG48ztMbGJHFNfCvfHtNjWLInr3ku5J%2BDAPu0%3D"},{"@type":"BreadcrumbList","@id":"https:\/\/heardintech.com\/index.php\/2025\/08\/12\/why-passwordless-authentication-is-becoming-essential-and-how-to-make-the-switch\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/heardintech.com\/"},{"@type":"ListItem","position":2,"name":"Why passwordless authentication is becoming essential \u2014 and how to make the switch"}]},{"@type":"WebSite","@id":"https:\/\/heardintech.com\/#website","url":"https:\/\/heardintech.com\/","name":"Heard in Tech","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/heardintech.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/heardintech.com\/#\/schema\/person\/f8fcdb7c54e1055e21f72cd6391c8e02","name":"Morgan Blake","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/heardintech.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c47cf329501de15b9ec60ff149016fd745312ad424eb0e43e64f6797db661fb5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c47cf329501de15b9ec60ff149016fd745312ad424eb0e43e64f6797db661fb5?s=96&d=mm&r=g","caption":"Morgan Blake"},"sameAs":["https:\/\/heardintech.com"],"url":"https:\/\/heardintech.com\/index.php\/author\/admin_uz048z5b\/"}]}},"jetpack_featured_media_url":"","_links":{"self":[{"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/posts\/734","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/comments?post=734"}],"version-history":[{"count":1,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/posts\/734\/revisions"}],"predecessor-version":[{"id":866,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/posts\/734\/revisions\/866"}],"wp:attachment":[{"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/media?parent=734"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/categories?post=734"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/heardintech.com\/index.php\/wp-json\/wp\/v2\/tags?post=734"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}