{"id":1,"date":"2020-07-22T02:27:10","date_gmt":"2020-07-22T09:27:10","guid":{"rendered":"http:\/\/mohar.wpms.liikus.com\/?p=1"},"modified":"2020-07-22T15:43:53","modified_gmt":"2020-07-22T22:43:53","slug":"hello-world","status":"publish","type":"post","link":"https:\/\/mohar-security.net\/?p=1","title":{"rendered":"Security is More Important Than Ever"},"content":{"rendered":"<p>Computer System Security has never been more important and necessary than ever. In today&#8217;s ever-changing world, threat actors are more persistent and in many cases more capable than the average security professional. They are organizations of State-Sponsored spies trying to steal your proprietary information, use your computer resources for their own benefit, and take down\/ransom your own systems.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Computer System Security has never been more important and necessary than ever. In today&#8217;s ever-changing world, threat actors are more persistent and in many cases more capable than the average security professional. They are organizations of State-Sponsored spies trying to steal your proprietary information, use your computer resources for their own benefit, and take down\/ransom&#8230;<\/p>\n","protected":false},"author":12,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[1],"tags":[],"_links":{"self":[{"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/posts\/1"}],"collection":[{"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/users\/12"}],"replies":[{"embeddable":true,"href":"https:\/\/mohar-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1"}],"version-history":[{"count":1,"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions"}],"predecessor-version":[{"id":12,"href":"https:\/\/mohar-security.net\/index.php?rest_route=\/wp\/v2\/posts\/1\/revisions\/12"}],"wp:attachment":[{"href":"https:\/\/mohar-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/mohar-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/mohar-security.net\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}