{"id":1090,"date":"2024-06-18T10:15:52","date_gmt":"2024-06-18T14:15:52","guid":{"rendered":"https:\/\/wp-dcb.resultspw.com\/?page_id=1090"},"modified":"2024-07-17T09:43:39","modified_gmt":"2024-07-17T13:43:39","slug":"protect-business-information","status":"publish","type":"page","link":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/","title":{"rendered":"Protect Business Information"},"content":{"rendered":" <div class=\"page-header-simple section-bg-blue \"> <div class=\"container\"> <nav id=\"breadcrumb\" class=\"breadcrumb\" aria-label=\"Breadcrumb\"><span><span><a href=\"https:\/\/www.deanbank.com\/\">Home<\/a><\/span><\/span><\/nav> <h1 class=\"title\">Protect Business Information<\/h1> <\/div><\/div>\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-is-layout-9d6595d7 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\"> <div class=\"block-product\"> <div class=\"product-container\"> <div class=\"content\"> <div class=\"body\"> <p><strong>Corporate Account Takeover (CATO)<\/strong><\/p><p>Cyber criminals are targeting the financial accounts of owners and employees of small and medium sized businesses, resulting in significant business disruption and substantial monetary losses due to fraudulent transfers from these accounts. Often these funds may not be recovered.<\/p><p><strong>What is CATO?<\/strong><\/p><p>Corporate account takeover is a type of fraud where thieves gain access to a business\u2019 finances to make unauthorized transactions, including transferring funds from the company, creating and adding new fake employees to payroll, and stealing sensitive customer information that may not be recoverable. Criminals can then initiate fraudulent wire transfers and transactions through ACH to any account.<\/p><p><strong>Dean Bank recommends following these tips to keep your small business safe:<\/strong><\/p><ul><li>Educate your employees. You and your employees are the first line of defense against corporate account takeover. A strong security program paired with employee education about the warning signs, safe practices, and responses to a suspected takeover are essential to protecting your company and customers. Review risky behavior with employees, especially when opening unsolicited<\/li><\/ul><p>Dean Bank has several online banking alerts that can notify users of account activity. We highly recommend that customers use these alerts to be notified about transactions and balances to prevent unauthorized activity from occurring.<\/p><p><strong>Protect your online and computer environment<\/strong><strong>: <\/strong><\/p><p><strong>\u00a0<\/strong>NEVER give out your username or password to anyone online or over the phone. Dean Bank will never send you text messages or emails asking you for usernames and passwords. We will also not ask for this information over the phone, as we have no access to your passwords. If you get an email, text, or call requesting changes to online banking, please call us at 508-528-0088 to speak with us.<\/p><ul><li>Always call your bank with any issue, email, text, or phone call asking for information<\/li><li>Minimize the number of machines used for various business Consider conducting online banking on dedicated machines segregated from other business functions.<\/li><li>Always lock computers when unattended, especially those with administrator<\/li><li>Install and maintain anti-virus, anti-malware and anti-spam programs that periodically scan file<\/li><li>Utilize firewalls and routers to restrict network<\/li><li>Ensure that programs are consistently updated through an organized patching<\/li><li>Create regular backup copies of system<\/li><li>Encrypt hard drives if possible, and if not, encrypt important documents including those containing sensitive<\/li><li>Depending on your business, look into cybersecurity insurance<\/li><\/ul><p><strong>Enhance processes and procedures for corporate banking activity<\/strong>: When conducting Automated Clearing House ACH or wire transfer activities, utilize dual controls through two separate computers if possible.<\/p><p><strong>Pay attention to suspicious activity and react quickly.<\/strong><strong>\u00a0If you think that there might be an issue:<\/strong><\/p><ul><li>Look out for unexplained account or network activity, pop ups, and suspicious emails.<\/li><li>If detected, immediately contact your financial institution, stop all online activity and remove any systems that may have been compromised. Keep records of what happened.<\/li><li>Ensure all proper authorities are contacted, such as senior management at your firm, information technology personnel banking institutions, and the police<\/li><\/ul><p>\u00a0<strong>Understand your responsibilities and liabilities.<\/strong><strong>\u00a0<\/strong>The account agreement with your bank will detail what commercially\u00a0 reasonable security measures are required in your business. It is critical that you understand and implement the security safeguards in the agreement. If you don\u2019t, you could be liable for losses resulting from a takeover. Talk to your banker if you have any questions about your responsibilities.<\/p><h3>What to do if a breach is suspected:<\/h3><ul><li>Cease all online activity and remove any compromised systems from the network.<\/li><li>Ensure all proper authorities are contacted, such as senior management at your firm, information technology personnel, banking institutions, and the police.<\/li><li>Maintain a written log of events that have transpired since abnormal activity was detected.<\/li><li>Consider what kind of data might have been accessed by the intruding party.<\/li><li>File a police report and provide any facts known about the circumstances surrounding the loss.<\/li><li>Have a contingency plan in place to recover systems that are suspected to have been breached.<\/li><\/ul><h2>Resources for Business Account Holders<\/h2><p><strong>Resources for Business Account Holders<\/strong><strong>\u00a0<\/strong><\/p><ol><li>The Better Business Bureau\u2019s website on Data Security Made Simpler:\u00a0<a class=\"speedbump\" href=\"http:\/\/www.bbb.org\/data-security\/\" target=\"_blank\" rel=\"noopener\">http:\/\/www.bbb.org\/data-security\/<\/a><\/li><\/ol><ol start=\"2\"><li>The Federal Trade Commission\u2019s (FTC) interactive business guide for protecting data: <a class=\"speedbump\" href=\"http:\/\/www.ftc.gov\/bcp\/edu\/multimedia\/interactive\/infosecurity\/index.html\" target=\"_blank\" rel=\"noopener\">http:\/\/www.ftc.gov\/bcp\/edu\/multimedia\/interactive\/infosecurity\/index.html<\/a><\/li><li>The National Institute of Standards and Technology\u2019s (NIST) Fundamentals of Information Security for Small Businesses: <a class=\"speedbump\" href=\"http:\/\/csrc.nist.gov\/publications\/nistir\/ir7621\/nistir-7621.pdf\" target=\"_blank\" rel=\"noopener\">http:\/\/csrc.nist.gov\/publications\/nistir\/ir7621\/nistir-7621.pdf<\/a><\/li><li>NACHA \u2013 The Electronic Payments Association\u2019s website has numerous articles regarding Corporate Account Takeover for both financial institutions and banking customers: <a class=\"speedbump\" href=\"https:\/\/www.nacha.org\/\" target=\"_blank\" rel=\"noopener\">Nacha - Homepage | Nacha<\/a><\/li><\/ol><p>\u00a0<\/p><p><strong>Business Email Compromise (BEC) Alert &amp; Protective measures<\/strong><\/p><p><strong>\u00a0<\/strong>Business email compromise attacks appear to be too lucrative for the criminally inclined for them to go away anytime soon.<\/p><p>Such social engineering scams, also known as CEO fraud, are designed to trick recipients into sending money directly to attackers. Often, they do this by attempting to exploit a company's accounts payable process, perhaps using a psychological lever or two as they unfurl. Common ploy is indicating by text saying they need some sort of monetary assistance (wire transfer, movement of funds, even purchase of gift cards) <strong>immediately.<\/strong><\/p><p><strong>Targets of business email compromise<\/strong><\/p><p>Anyone can be the target of a BEC scam. Businesses, governments, nonprofits, and schools are all targeted, specifically these roles:<\/p><ul><li><strong>Executives and leaders<\/strong>, because details about them are often publicly available on the company website, so attackers can pretend to know them.<\/li><li><strong>Finance employees<\/strong> like controllers and accounts payable staff who have banking details, payment methods, and account numbers.<\/li><li><strong>HR managers<\/strong> with employee records like social security numbers, tax statements, contact info, and schedules.<\/li><li><strong>New or entry-level employees<\/strong> who won\u2019t be able to verify an email\u2019s legitimacy with the sender.<\/li><\/ul><p>Bad actors use several key points to make the victim try to process the transaction:<\/p><p><strong>Sense of urgency<\/strong> \u2013 The idea that this has to happen right away, so don\u2019t take the time to go through normal channels, I\u2019m the CEO and I need this<\/p><p><strong>Sense of danger<\/strong> \u2013 That if this isn\u2019t done, there could be customer impact, or financial or reputational impact to the institution<\/p><p><strong>Knowledge of absence<\/strong> \u2013 Many of these attacks take place when the bad actors KNOW the CEO or high-level staff person is at a seminar or otherwise disposed. They count on the fact that the employee doesn\u2019t have immediate access to check on the request in person.<\/p><p><strong>BEC attacks tend to fall into roughly five categories:<\/strong><\/p><p><strong>Supplier swindle<\/strong>: Attackers call, email or fax a business that has a longstanding relationship with a supplier, pretending to be the supplier, and trying to trick the business into wiring funds for outstanding invoices to an attacker-controlled account. \"This particular version has also been referred to as 'The Bogus Invoice Scheme,' 'The Supplier Swindle' and 'Invoice Modification Scheme,'\u201d. Recently, this has been executed by simply submitting new account information for the phony customer, so that when a legitimate bill comes in, funds are sent to the wrong account.<\/p><p><strong>CEO fraud:<\/strong> Attackers compromise a high-level business executive's email or texing accounts and them it to impersonate the executive and send money-transfer requests to victims. In some instances a request for a wire transfer from the compromised account is sent directly to the financial institution with instructions to urgently send funds to bank 'X' for reason 'Y'. Other times the fraud is smaller, with the criminal asking for gift wards or other personal purchases. This particular version has also been referred to as 'CEO Fraud,' 'Business Executive Scam.<\/p><p><strong>Account compromise<\/strong>: Attackers hack into a victim's email account and then use it to request invoice payments to multiple vendors listed in their address book. The hacked victim's employer, meanwhile may not become aware of the fraudulent requests until they are contacted by their vendors to follow up on the status of their invoice payment.<\/p><p><strong>Attorney impersonation<\/strong>: Attackers pretend to be a lawyer or someone from the law firm supposedly in charge of crucial and confidential matters. Normally, such bogus requests are done through email or phone, and during the end of the business day.<\/p><p><strong>Data theft:<\/strong> Attackers target personally identifiable information - including Social Security numbers - or employees' tax statements, in what's known as W-2 attacks. Such information can be used for filing fake tax returns, opening bogus accounts, identity theft and fraud. These attacks often go undetected until the data is used by the criminal.<\/p><p><strong>How to protect yourself:<\/strong><\/p><ul><li>Be careful with what information you share online or on social media. By openly sharing things like pet names, schools you attended, links to family members, and your birthday, you can give a scammer all the information they need to guess your password or answer your security questions.<\/li><li>Don\u2019t click on anything in an unsolicited email or text message asking you to update or verify account information. Look up the company\u2019s phone number on your own (don\u2019t use the one a potential scammer is providing), and call the company to ask if the request is legitimate.<\/li><li>Carefully examine the email address, URL, and spelling used in any correspondence. Scammers use slight differences to trick your eye and gain your trust.<\/li><li>Be careful what you download. Never open an email attachment from someone you don't know, and be wary of email attachments forwarded to you.<\/li><li>Verify payment and purchase requests in person if possible or by calling the person to make sure it is legitimate. You should verify any change in account number or payment procedures with the person making the request.<\/li><li>Set up multifactor authentication (MFA) - Make your email harder to compromise by turning on multifactor authentication, which requires a code, PIN, or fingerprint to log in as well as your password<\/li><li>Teach employees to spot warning signs - Make sure everyone knows how to spot phishing links, a domain and email address mismatch, and other red flags. Simulate a BEC scam so people recognize one when it happens.<\/li><\/ul><p><strong>Helpful links and sources of additional information:<\/strong><\/p><p><a class=\"speedbump\" href=\"https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-business-email-compromise-bec\" target=\"_blank\" rel=\"noopener\">https:\/\/www.microsoft.com\/en-us\/security\/business\/security-101\/what-is-business-email-compromise-bec<\/a><\/p><p><a class=\"speedbump\" href=\"https:\/\/www.crowdstrike.com\/cybersecurity-101\/business-email-compromise-bec\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.crowdstrike.com\/cybersecurity-101\/business-email-compromise-bec\/<\/a><\/p><p><a class=\"speedbump\" href=\"https:\/\/www.tessian.com\/blog\/business-email-compromise-bec-examples\/\" target=\"_blank\" rel=\"noopener\">https:\/\/www.tessian.com\/blog\/business-email-compromise-bec-examples\/<\/a><\/p> <\/div><\/div><\/div><\/div><\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\"> <section role=\"search\" aria-label=\"Search Area: How Can we Help?\" class=\"mod-help\"> <div class=\"help-container\"> <h3 class=\"title\">How can we help?<\/h3> <form id=\"sidebar-search\" method=\"GET\" action=\"\/search\/\"> <label class=\"visuallyhidden\">Search our site<\/label> <input type=\"search\" name=\"search_key\" class=\"help-search-input\" placeholder=\"I want to...\" \/><button class=\"help-search-submit\"><img decoding=\"async\" src=\"https:\/\/www.deanbank.com\/wp-content\/themes\/dcb-theme\/images\/ico-sidebar-search.svg\" alt=\"Submit Search\"\/><\/button> <\/form> <\/div><\/section> <section aria-label=\"Related Products and Services\" class=\"nav-related\"> <h3>View our Products & Services<\/h3> <!-- Menu: 3 --><!-- Menu Name = 3 --><!-- Base ID = 766 because base is 766 --><nav class=\"menu_nav cm_3\" aria-label=\"Security Center Menu\"><ul><li class='item_spot_96 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-personal-information vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-personal-information' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-personal-information\/'>Protect Personal Information<\/a><\/li><li class='item_spot_97 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-business-information vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-business-information' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-business-information\/'>Protect Business Information<\/a><\/li><li class='item_spot_98 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-atm-and-debit-cards vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-atm-and-debit-cards' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-atm-and-debit-cards\/'>Protect ATM and Debit Cards<\/a><\/li><li class='item_spot_99 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-yourself-at-the-atm vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-yourself-at-the-atm' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-yourself-at-the-atm\/'>Protect Yourself at the ATM<\/a><\/li><li class='item_spot_100 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-against-phishing-or-email-fraud vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-against-phishing-or-email-fraud' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-against-phishing-or-email-fraud\/'>Protect Against Phishing or Email Fraud<\/a><\/li><li class='item_spot_101 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-yourself-from-telephone-fraud vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-yourself-from-telephone-fraud' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-yourself-from-telephone-fraud\/'>Protect Yourself from Telephone Fraud<\/a><\/li><li class='item_spot_102 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/protect-your-electronic-device vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='protect-your-electronic-device' data-nav-item-parent-id='766' href='\/resources\/security-center\/protect-your-electronic-device\/'>Protect Your Electronic Device<\/a><\/li><li class='item_spot_103 expanded  not_current'>\r\n                            <!-- Base Parent ID = \/resources\/security-center\/useful-security-resources vs \/wp-json\/wp\/v2\/pages\/1090 --><a target='' class='' data-nav-item-id='useful-security-resources' data-nav-item-parent-id='766' href='\/resources\/security-center\/useful-security-resources\/'>Useful Security Resources<\/a><\/li><\/ul><\/nav> <\/section> <\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":7,"featured_media":0,"parent":1077,"menu_order":59,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":""},"links_old_site_id":[],"class_list":["post-1090","page","type-page","status-publish","hentry"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Protect Business Information - Dean Bank<\/title>\n<meta name=\"description\" content=\"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Protect Business Information - Dean Bank\" \/>\n<meta property=\"og:description\" content=\"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/\" \/>\n<meta property=\"og:site_name\" content=\"Dean Bank\" \/>\n<meta property=\"article:modified_time\" content=\"2024-07-17T13:43:39+00:00\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/\",\"url\":\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/\",\"name\":\"Protect Business Information - Dean Bank\",\"isPartOf\":{\"@id\":\"https:\/\/www.deanbank.com\/#website\"},\"datePublished\":\"2024-06-18T14:15:52+00:00\",\"dateModified\":\"2024-07-17T13:43:39+00:00\",\"description\":\"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.deanbank.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Resources\",\"item\":\"https:\/\/www.deanbank.com\/resources\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Security Center\",\"item\":\"https:\/\/www.deanbank.com\/resources\/security-center\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Protect Business Information\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.deanbank.com\/#website\",\"url\":\"https:\/\/www.deanbank.com\/\",\"name\":\"Dean Bank\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.deanbank.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Protect Business Information - Dean Bank","description":"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/","og_locale":"en_US","og_type":"article","og_title":"Protect Business Information - Dean Bank","og_description":"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.","og_url":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/","og_site_name":"Dean Bank","article_modified_time":"2024-07-17T13:43:39+00:00","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/","url":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/","name":"Protect Business Information - Dean Bank","isPartOf":{"@id":"https:\/\/www.deanbank.com\/#website"},"datePublished":"2024-06-18T14:15:52+00:00","dateModified":"2024-07-17T13:43:39+00:00","description":"Review tips provided by Dean Bank about protecting business information and maintaining confidentiality.","breadcrumb":{"@id":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.deanbank.com\/resources\/security-center\/protect-business-information\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.deanbank.com\/"},{"@type":"ListItem","position":2,"name":"Resources","item":"https:\/\/www.deanbank.com\/resources\/"},{"@type":"ListItem","position":3,"name":"Security Center","item":"https:\/\/www.deanbank.com\/resources\/security-center\/"},{"@type":"ListItem","position":4,"name":"Protect Business Information"}]},{"@type":"WebSite","@id":"https:\/\/www.deanbank.com\/#website","url":"https:\/\/www.deanbank.com\/","name":"Dean Bank","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.deanbank.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/pages\/1090","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/users\/7"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/comments?post=1090"}],"version-history":[{"count":2,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/pages\/1090\/revisions"}],"predecessor-version":[{"id":1107,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/pages\/1090\/revisions\/1107"}],"up":[{"embeddable":true,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/pages\/1077"}],"wp:attachment":[{"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/media?parent=1090"}],"wp:term":[{"taxonomy":"links_old_site_id","embeddable":true,"href":"https:\/\/www.deanbank.com\/wp-json\/wp\/v2\/links_old_site_id?post=1090"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}