{"id":43143,"date":"2025-09-04T14:11:28","date_gmt":"2025-09-04T18:11:28","guid":{"rendered":"https:\/\/gtm.com\/household\/?p=43143"},"modified":"2025-09-04T14:14:00","modified_gmt":"2025-09-04T18:14:00","slug":"family-office-cybersecurity","status":"publish","type":"post","link":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/","title":{"rendered":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-43144 size-full\" src=\"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\" alt=\"family-office-cybersecurity\" width=\"2560\" height=\"1707\" srcset=\"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg 2560w, https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-1280x854.jpg 1280w, https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-980x653.jpg 980w, https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-480x320.jpg 480w\" sizes=\"(min-width: 0px) and (max-width: 480px) 480px, (min-width: 481px) and (max-width: 980px) 980px, (min-width: 981px) and (max-width: 1280px) 1280px, (min-width: 1281px) 2560px, 100vw\" \/><\/p>\n<p>In the world of family offices, you manage complex financial affairs, personal information, and the legacy of a high-net-worth family. This combination of privacy and wealth also makes your organization a target for cybercriminals.<\/p>\n<p>While large corporations have entire departments dedicated to cybersecurity, a family office often operates with a smaller staff, creating an opportunity for hackers. Understanding this unique risk is the first step toward effective protection.<\/p>\n<h1>The Unique Vulnerabilities of Family Offices<\/h1>\n<p>Several things make a family office attractive to cybercriminals.<\/p>\n<h3>High-Value Data<\/h3>\n<p>You don&#8217;t just hold financial information like account numbers and investment strategies. You also manage sensitive personal data, from social security numbers and addresses to private family schedules and correspondence. This information may be more valuable on the black market than a simple credit card number.<\/p>\n<h3>Targeted Social Engineering<\/h3>\n<p>Cybercriminals use sophisticated methods to bypass technical defenses. Instead of mass phishing emails, they deploy highly personalized attacks. They might impersonate a family member, a trusted advisor, or a key vendor to trick an employee into revealing information.<\/p>\n<h3>The Human Factor<\/h3>\n<p>Family offices often have a high-trust, low-turnover culture. While this is a huge asset, it can also create vulnerabilities. Employees may be less suspicious of an email from a &#8220;trusted&#8221; contact, making them susceptible to attacks that exploit personal relationships.<\/p>\n<h3>Blurred Lines<\/h3>\n<p>The line between personal and professional can be blurred. Devices used for both work and personal tasks, along with connected home devices and family members&#8217; social media use, can create new entry points for an attacker to get inside your network.<\/p>\n<h1>Three Ways to Protect Your Family Office<\/h1>\n<p>While the risks are significant, you don\u2019t have to go it alone. By implementing a few key strategies, you can build a strong defense.<\/p>\n<h3><span style=\"color: #333333; font-size: 22px;\">Treat Your Team as Your First Line of Defense<\/span><\/h3>\n<p>The most advanced technology can be useless against a well-executed attack. Regular, mandatory cybersecurity training is crucial. This training should go beyond basic password advice and teach your team how to spot phishing emails, verify financial requests, and understand the importance of secure communication.<\/p>\n<h3><span style=\"color: #333333; font-size: 22px;\">Implement Strong Access Controls<\/span><\/h3>\n<p>Multi-factor authentication (MFA) should be mandatory for every account, from email to financial websites. Even if a password is compromised, MFA adds a critical second layer of protection. This simple step can prevent the vast majority of account takeovers<\/p>\n<h3><span style=\"color: #333333; font-size: 22px;\">Have a Plan for the Worst<\/span><\/h3>\n<p>An incident response plan is a must. This plan should outline the immediate steps to take after a breach is discovered, identify the contact person, and describe the process for containing the damage. Knowing how to react in a crisis can be the difference between a minor incident and a major loss.<\/p>\n<h1>How GTM Can Be Your Partner in Protection<\/h1>\n<p>Managing the people-related aspects of cybersecurity can be just as challenging as the technical ones.<\/p>\n<p>Our HR experts can help you establish and enforce best practices for your team. We assist with creating cybersecurity policies, developing employee handbooks, and providing the employee management guidance you need to ensure your team is trained and equipped to maintain a secure environment.<\/p>\n<p>And because financial protection is equally important, we can also help you secure the right cyber security coverage. Through <a href=\"https:\/\/gtminsurance.com\/business-insurance\/cyber-data-breach-liability\/\">GTM Insurance Agency<\/a>, we can connect you with <a href=\"https:\/\/gtminsurance.com\/business-insurance\/cyber-data-breach-liability\/\">specialized cyber security insurance<\/a> to protect your family office from the financial fallout of a breach, including data recovery, legal fees, and regulatory fines.<\/p>\n<p>Ready to strengthen your defenses? Contact us at (800) 929-9213 or book a\u00a0<a href=\"https:\/\/gtm.com\/household\/free-consultation\/\">complimentary, no-obligation consultation<\/a> to learn how we can help your family office reduce its risk and streamline its operations.<\/p>\n<h2>Download The Complete Guide to Household Payroll<\/h2>\n<p>Get our complimentary guide and learn everything you need to know about paying your employees legally and filing your taxes the right way.<br \/>\n<script src=\"\/\/app-abd.marketo.com\/js\/forms2\/js\/forms2.min.js\"><\/script><\/p>\n<form id=\"mktoForm_1775\"><\/form>\n<p><script>MktoForms2.loadForm(\"\/\/app-abd.marketo.com\", \"963-ZNS-159\", 1775);<\/script><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.<\/p>\n","protected":false},"author":19,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","footnotes":""},"categories":[581,2],"tags":[582,31,32],"class_list":["post-43143","post","type-post","status-publish","format-standard","hentry","category-family-office","category-gtmblog","tag-family-office","tag-household-employer","tag-household-employment"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)<\/title>\n<meta name=\"description\" content=\"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/gtm.com\/household\/family-office-cybersecurity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)\" \/>\n<meta property=\"og:description\" content=\"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/gtm.com\/household\/family-office-cybersecurity\/\" \/>\n<meta property=\"og:site_name\" content=\"GTM Household\" \/>\n<meta property=\"article:published_time\" content=\"2025-09-04T18:11:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-04T18:14:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1707\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sarah Dwyer\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sarah Dwyer\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/\"},\"author\":{\"name\":\"Sarah Dwyer\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#\\\/schema\\\/person\\\/5f46933f99e9f43265c6459ddca9be87\"},\"headline\":\"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)\",\"datePublished\":\"2025-09-04T18:11:28+00:00\",\"dateModified\":\"2025-09-04T18:14:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/\"},\"wordCount\":639,\"publisher\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\",\"keywords\":[\"family office\",\"household employer\",\"household employment\"],\"articleSection\":[\"Family Office\",\"GTM Blog\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/\",\"url\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/\",\"name\":\"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\",\"datePublished\":\"2025-09-04T18:11:28+00:00\",\"dateModified\":\"2025-09-04T18:14:00+00:00\",\"description\":\"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\",\"contentUrl\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/2025\\\/09\\\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg\",\"width\":2560,\"height\":1707,\"caption\":\"family-office-cybersecurity\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/family-office-cybersecurity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/gtm.com\\\/household\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#website\",\"url\":\"https:\\\/\\\/gtm.com\\\/household\\\/\",\"name\":\"GTM Household\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/gtm.com\\\/household\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#organization\",\"name\":\"GTM Payroll Services\",\"url\":\"https:\\\/\\\/gtm.com\\\/household\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/gtm-logo-2.png\",\"contentUrl\":\"https:\\\/\\\/gtm.com\\\/household\\\/wp-content\\\/uploads\\\/gtm-logo-2.png\",\"width\":193,\"height\":92,\"caption\":\"GTM Payroll Services\"},\"image\":{\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/gtm.com\\\/household\\\/#\\\/schema\\\/person\\\/5f46933f99e9f43265c6459ddca9be87\",\"name\":\"Sarah Dwyer\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g\",\"caption\":\"Sarah Dwyer\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)","description":"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/","og_locale":"en_US","og_type":"article","og_title":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)","og_description":"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.","og_url":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/","og_site_name":"GTM Household","article_published_time":"2025-09-04T18:11:28+00:00","article_modified_time":"2025-09-04T18:14:00+00:00","og_image":[{"width":2560,"height":1707,"url":"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg","type":"image\/jpeg"}],"author":"Sarah Dwyer","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Sarah Dwyer","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#article","isPartOf":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/"},"author":{"name":"Sarah Dwyer","@id":"https:\/\/gtm.com\/household\/#\/schema\/person\/5f46933f99e9f43265c6459ddca9be87"},"headline":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)","datePublished":"2025-09-04T18:11:28+00:00","dateModified":"2025-09-04T18:14:00+00:00","mainEntityOfPage":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/"},"wordCount":639,"publisher":{"@id":"https:\/\/gtm.com\/household\/#organization"},"image":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg","keywords":["family office","household employer","household employment"],"articleSection":["Family Office","GTM Blog"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/","url":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/","name":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)","isPartOf":{"@id":"https:\/\/gtm.com\/household\/#website"},"primaryImageOfPage":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#primaryimage"},"image":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#primaryimage"},"thumbnailUrl":"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg","datePublished":"2025-09-04T18:11:28+00:00","dateModified":"2025-09-04T18:14:00+00:00","description":"Learn why your family office is a top target for cyber attacks. Discover key cybersecurity vulnerabilities and best practices, plus how GTM helps with expert HR guidance and specialized insurance.","breadcrumb":{"@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/gtm.com\/household\/family-office-cybersecurity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#primaryimage","url":"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg","contentUrl":"https:\/\/gtm.com\/household\/wp-content\/uploads\/2025\/09\/cybersecurity-concept-system-administrator-enhanc-2024-12-06-13-56-41-utc-scaled.jpg","width":2560,"height":1707,"caption":"family-office-cybersecurity"},{"@type":"BreadcrumbList","@id":"https:\/\/gtm.com\/household\/family-office-cybersecurity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/gtm.com\/household\/"},{"@type":"ListItem","position":2,"name":"Why Your Family Office Is a Prime Cyber Security Target (and How to Protect It)"}]},{"@type":"WebSite","@id":"https:\/\/gtm.com\/household\/#website","url":"https:\/\/gtm.com\/household\/","name":"GTM Household","description":"","publisher":{"@id":"https:\/\/gtm.com\/household\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/gtm.com\/household\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/gtm.com\/household\/#organization","name":"GTM Payroll Services","url":"https:\/\/gtm.com\/household\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/gtm.com\/household\/#\/schema\/logo\/image\/","url":"https:\/\/gtm.com\/household\/wp-content\/uploads\/gtm-logo-2.png","contentUrl":"https:\/\/gtm.com\/household\/wp-content\/uploads\/gtm-logo-2.png","width":193,"height":92,"caption":"GTM Payroll Services"},"image":{"@id":"https:\/\/gtm.com\/household\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/gtm.com\/household\/#\/schema\/person\/5f46933f99e9f43265c6459ddca9be87","name":"Sarah Dwyer","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/48f59767702d61008a9d38d96718b26b97f2c8f4802f995c49a072929dec2845?s=96&d=mm&r=g","caption":"Sarah Dwyer"}}]}},"_links":{"self":[{"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/posts\/43143","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/comments?post=43143"}],"version-history":[{"count":2,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/posts\/43143\/revisions"}],"predecessor-version":[{"id":43147,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/posts\/43143\/revisions\/43147"}],"wp:attachment":[{"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/media?parent=43143"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/categories?post=43143"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/gtm.com\/household\/wp-json\/wp\/v2\/tags?post=43143"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}