{"id":5637,"date":"2017-08-25T16:42:02","date_gmt":"2017-08-25T06:42:02","guid":{"rendered":"https:\/\/roubler.com\/hk\/?p=5637"},"modified":"2021-03-09T09:40:16","modified_gmt":"2021-03-08T22:40:16","slug":"cloud-software-security-business","status":"publish","type":"post","link":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/","title":{"rendered":"The Basics of Cloud Software Security for Your Business"},"content":{"rendered":"<p>The <a href=\"https:\/\/roubler.com\/hr-technology\/\">cloud<\/a> is undoubtedly <a href=\"https:\/\/roubler.com\/hk\/qantas-cloud-computing\/\">the future of data storage and function<\/a>. Not long ago, every computer program had to be installed onto each individual PC. All the data generated by this software was also kept on the individual computer. However, as our internet access and speed has increased, these processes have changed. It is now commonplace for programs, and the data they create, to be stored on remote servers.<\/p>\n<p>This centralisation of applications and data storage to a remote server is a big change. And it\u2019s come about quite quickly. <a href=\"https:\/\/www.ibm.com\/au-en\/\">IBM<\/a> recently approximated that 90% of all digital data ever created was made in the last two years. The large majority of this data is stored online.<\/p>\n<p>Across the globe businesses are relocating their data to the cloud. There are many benefits to doing so, as we will explain. We will also address issues of cloud software security, and offer tips to keep your data safe!<\/p>\n<h2><strong>Benefits of the cloud\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong><\/h2>\n<ol>\n<li>\n<h3>Reduced IT costs and a better experience<\/h3>\n<\/li>\n<\/ol>\n<p>Software frequently needs to be upgraded, and data backed-up. Running applications through the cloud generally means they will update and back-up automatically! Not only is this convenient, but you will never be caught out with outdated programs or unsaved data. Furthermore, cloud software is typically run on monthly pay subscriptions, meaning there is no one large expense. Plus, there\u2019s the added peace of mind that IT professionals are managing your data, not inexperienced in-house administrative staff.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"2\">\n<li>\n<h3>Your software will update faster<\/h3>\n<\/li>\n<\/ol>\n<p>Cloud software itself has become a booming industry. As a result, updates and bug fixes are implemented very regularly. Hence, you will always be running on the latest \u2013 and safest \u2013 software.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>\n<h3>You can access your data anywhere, anytime<\/h3>\n<\/li>\n<\/ol>\n<p>Perhaps one of the biggest bonuses of cloud software is its accessibility. As long as you can connect to the internet, you can access all of your programs and data with a simple login. You\u2019re no longer restricted to one computer to do you work. Instead, increased work efficiency can be achieved by working from home, or when on the road. Most programs don\u2019t even require a PC \u2013 a smartphone will do!<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li>\n<h3>Easy data recovery in emergency situations<\/h3>\n<\/li>\n<\/ol>\n<p>In the case of an emergency situation in your office \u2013 such as a loss of power, flood, fire, or robbery \u2013 the security of data stored only on each PC is very low. However, if all of your programs and data are saved onto the cloud, it is very easy to re-download them onto replacement computers and devices.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>\n<h3>Easier data sharing and cross-program compatibility<\/h3>\n<\/li>\n<\/ol>\n<p>Cloud systems are typically compatible with one another, meaning you can easily share data between them. For example, your existing point-of-sale software could be integrated with new payroll software. Or you can choose certain cloud software with multi-capability.\u00a0Roubler, for example, is a h<a href=\"https:\/\/roubler.com\/how-it-works\/\">uman resources cloud software<\/a>. Roubler caters for the entire employment life-cycle from <a href=\"https:\/\/roubler.com\/features\/recruitment-job-posting-software\/\">recruitment <\/a>through to <a href=\"https:\/\/roubler.com\/hk\/features\/payroll-software\/\">payroll<\/a>, with all data accessible via the cloud 24\/7.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>How does cloud software work?<\/strong><\/h2>\n<p>A common query about cloud software security is how data is actually stored. Typically, your data is kept in secure servers in large data centres. These data centres are managed 24\/7 by IT professionals.<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-5640 alignright\" src=\"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security-2-300x152.png\" alt=\"the basics of cloud software security\" width=\"446\" height=\"226\" srcset=\"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security-2-300x152.png 300w, https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security-2-768x390.png 768w, https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security-2-1024x520.png 1024w, https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security-2.png 1260w\" sizes=\"auto, (max-width: 446px) 100vw, 446px\" \/><\/p>\n<p>Data is transmitted between your computer and the secure data centre using encrypted connections. Because the data is encrypted both when it is being sent and when it is being received, no third parties can intercept and download your data.<\/p>\n<p>Cloud software companies specialise in such processes. As a result, the connection is very secure and data privacy is taken extremely seriously.<\/p>\n<p>&nbsp;<\/p>\n<h2><strong>Cloud software security &#8211; 5 top tips to keep your data secure<\/strong><\/h2>\n<p>Cloud software security isn&#8217;t just about the actual software. Although cloud software companies take data safety seriously, there are some steps that you should take on your end to ensure optimal data security. Hacking can very easily be the fault of an individual employee \u2013 not the software. So here are 5 top tips to keep your data secure.<\/p>\n<ol>\n<li>\n<h3>Passwords should be secret and safe<\/h3>\n<\/li>\n<\/ol>\n<p>It\u2019s the oldest trick in the book, but password security really is <em>that<\/em> important. Family and pet names, as well as birthdays, are very easy to guess. Avoid these! Short passwords are easier to guess, so make your password as long as you can remember. Generally, the best passwords are long, unrelated to your life, and random. It\u2019s smart to mix up your passwords for each cloud software. You can also use a paraphrase, which is usually around 20 to 30 characters long.<\/p>\n<ol start=\"2\">\n<li>\n<h3>Multi-factor authentication should be activated<\/h3>\n<\/li>\n<\/ol>\n<p>Some cloud software solutions offers further authentication factors in addition to a username and password. The extra authentication could be a unique code sent to your email or phone, a voice call verification, or even a finger print. This adds an extra layer of security to your data. In the case that a hacker works out your password, there will be an extra step required before they can access your data.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"3\">\n<li>\n<h3>Monitor logins and online activity<\/h3>\n<\/li>\n<\/ol>\n<p>If you\u2019re using a cloud software that allows you to view how the system is being used, take advantage. Regularly monitoring who is logging on where makes it easier to detect when an unknown user has attempted to access your data. If you note anything suspicious, contact the relevant party and ask them to look into it. It\u2019s always better to be safe than sorry.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"4\">\n<li>\n<h3>Install anti-virus, or anti-malware<\/h3>\n<\/li>\n<\/ol>\n<p>Malicious software (malware for short) can be accidentally downloaded onto your device. It can happen as easily as downloading the attachment of a spam email, or clicking on the web address of a non-secure site. DO NOT ever click or download attachments from unknown senders. This is one of the most common ways that hackers get access to your data. It\u2019s also unlikely that you\u2019ll even know the malware has infiltrated your computer, as it is designed to remain hidden. Installing an anti-malware software from a reputable source onto your devices is an easy way to prevent such malware hacking your data.<\/p>\n<p>&nbsp;<\/p>\n<ol start=\"5\">\n<li>\n<h3>Keep your eyes peeled for phishing, and other means of hacking<\/h3>\n<\/li>\n<\/ol>\n<p>Emails loaded with malware, and unsecure websites are just some of the ways that your data can be hacked. Sometimes, it can involve actual people. Phone calls asking for your login details for an update are common. For example, someone may call and say: \u201cHi, it\u2019s Jane from your IT Support Team. I am trying to upgrade your software, but your password has been updated. Could you please provide your new password for the upgrade?\u201d All staff should be trained to look out for these fake calls, as well as spam emails and links.<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>Cloud software security is more about training and sensibility rather than the actual software itself. Cloud data storage is generally a lot safer than storing all of your information on site. It is a lot easier to steal a USB or a computer than to hack a secure cloud server. However, it is vital that all staff are trained to use to cloud software well. Create secure passwords, install anti-virus, be aware of hacking techniques, and track logins. Following these steps will ensure seamless use of the cloud to reap all of its benefits!<\/p>\n<p>&nbsp;<\/p>\n<p>For more detailed information and cloud software security, download our &#8220;Cloud security and your business&#8221; <a href=\"https:\/\/roubler.com\/ebooks-guides\/cloud-security-business\/\">E-Book here<\/a>.<\/p>\n<p>&nbsp;<\/p>\n<h6>Image Source: Ook Enterprises<\/h6>\n","protected":false},"excerpt":{"rendered":"<p>The cloud is undoubtedly the future of data storage and function. Not long ago, every computer program had &#8230;<\/p>\n","protected":false},"author":13,"featured_media":5639,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[892],"tags":[36,507,614,625,626,34,13,14,39,627,19],"class_list":["post-5637","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-innovation-technology","tag-automation","tag-cloud-based","tag-cloud-based-hr-software","tag-cloud-software","tag-cloud-software-security","tag-hr","tag-hr-software","tag-performance-management-software","tag-roubler","tag-software","tag-workforce-management-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>The Basics of Cloud Software Security for Your Business Roubler Hong Kong<\/title>\n<meta name=\"description\" content=\"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Basics of Cloud Software Security for Your Business | Roubler Hong Kong\" \/>\n<meta property=\"og:description\" content=\"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/\" \/>\n<meta property=\"og:site_name\" content=\"Roubler Hong Kong\" \/>\n<meta property=\"article:published_time\" content=\"2017-08-25T06:42:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-03-08T22:40:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png\" \/>\n\t<meta property=\"og:image:width\" content=\"848\" \/>\n\t<meta property=\"og:image:height\" content=\"397\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/\"},\"author\":{\"name\":\"\",\"@id\":\"\"},\"headline\":\"The Basics of Cloud Software Security for Your Business\",\"datePublished\":\"2017-08-25T06:42:02+00:00\",\"dateModified\":\"2021-03-08T22:40:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/\"},\"wordCount\":1252,\"image\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/roubler.com\\\/hk\\\/wp-content\\\/uploads\\\/sites\\\/64\\\/2017\\\/08\\\/cloud-software-security.png\",\"keywords\":[\"Automation\",\"cloud based\",\"cloud based HR software\",\"cloud software\",\"cloud software security\",\"HR\",\"HR Software\",\"Performance Management Software\",\"Roubler\",\"software\",\"Workforce Management Software\"],\"articleSection\":[\"Innovation &amp; technology\"],\"inLanguage\":\"en-AU\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/\",\"url\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/\",\"name\":\"The Basics of Cloud Software Security for Your Business | Roubler Hong Kong\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/roubler.com\\\/hk\\\/wp-content\\\/uploads\\\/sites\\\/64\\\/2017\\\/08\\\/cloud-software-security.png\",\"datePublished\":\"2017-08-25T06:42:02+00:00\",\"dateModified\":\"2021-03-08T22:40:16+00:00\",\"author\":{\"@id\":\"\"},\"description\":\"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/roubler.com\\\/hk\\\/wp-content\\\/uploads\\\/sites\\\/64\\\/2017\\\/08\\\/cloud-software-security.png\",\"contentUrl\":\"https:\\\/\\\/roubler.com\\\/hk\\\/wp-content\\\/uploads\\\/sites\\\/64\\\/2017\\\/08\\\/cloud-software-security.png\",\"width\":848,\"height\":397,\"caption\":\"the basics of cloud software security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/resources\\\/blog\\\/cloud-software-security-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/roubler.com\\\/hk\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"The Basics of Cloud Software Security for Your Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/roubler.com\\\/hk\\\/#website\",\"url\":\"https:\\\/\\\/roubler.com\\\/hk\\\/\",\"name\":\"Roubler Hong Kong\",\"description\":\"Hong Kong&#039;s Best Cloud HR, Employee Roster &amp; Payroll Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/roubler.com\\\/hk\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-AU\"},{\"@type\":\"Person\",\"@id\":\"\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Basics of Cloud Software Security for Your Business Roubler Hong Kong","description":"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/","og_locale":"en_US","og_type":"article","og_title":"The Basics of Cloud Software Security for Your Business | Roubler Hong Kong","og_description":"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.","og_url":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/","og_site_name":"Roubler Hong Kong","article_published_time":"2017-08-25T06:42:02+00:00","article_modified_time":"2021-03-08T22:40:16+00:00","og_image":[{"width":848,"height":397,"url":"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#article","isPartOf":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/"},"author":{"name":"","@id":""},"headline":"The Basics of Cloud Software Security for Your Business","datePublished":"2017-08-25T06:42:02+00:00","dateModified":"2021-03-08T22:40:16+00:00","mainEntityOfPage":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/"},"wordCount":1252,"image":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#primaryimage"},"thumbnailUrl":"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png","keywords":["Automation","cloud based","cloud based HR software","cloud software","cloud software security","HR","HR Software","Performance Management Software","Roubler","software","Workforce Management Software"],"articleSection":["Innovation &amp; technology"],"inLanguage":"en-AU"},{"@type":"WebPage","@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/","url":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/","name":"The Basics of Cloud Software Security for Your Business | Roubler Hong Kong","isPartOf":{"@id":"https:\/\/roubler.com\/hk\/#website"},"primaryImageOfPage":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#primaryimage"},"image":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#primaryimage"},"thumbnailUrl":"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png","datePublished":"2017-08-25T06:42:02+00:00","dateModified":"2021-03-08T22:40:16+00:00","author":{"@id":""},"description":"The cloud is undoubtedly the future of data storage and function. Here are our top tips to enhance cloud software security in your business.","breadcrumb":{"@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/"]}]},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#primaryimage","url":"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png","contentUrl":"https:\/\/roubler.com\/hk\/wp-content\/uploads\/sites\/64\/2017\/08\/cloud-software-security.png","width":848,"height":397,"caption":"the basics of cloud software security"},{"@type":"BreadcrumbList","@id":"https:\/\/roubler.com\/hk\/resources\/blog\/cloud-software-security-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/roubler.com\/hk\/"},{"@type":"ListItem","position":2,"name":"The Basics of Cloud Software Security for Your Business"}]},{"@type":"WebSite","@id":"https:\/\/roubler.com\/hk\/#website","url":"https:\/\/roubler.com\/hk\/","name":"Roubler Hong Kong","description":"Hong Kong&#039;s Best Cloud HR, Employee Roster &amp; Payroll Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/roubler.com\/hk\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-AU"},{"@type":"Person","@id":""}]}},"_links":{"self":[{"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/posts\/5637","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/comments?post=5637"}],"version-history":[{"count":0,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/posts\/5637\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/media\/5639"}],"wp:attachment":[{"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/media?parent=5637"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/categories?post=5637"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/roubler.com\/hk\/wp-json\/wp\/v2\/tags?post=5637"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}