{"id":63474,"date":"2020-04-02T15:01:11","date_gmt":"2020-04-02T14:01:11","guid":{"rendered":"https:\/\/www.bullhorn.com\/eu\/?p=63474"},"modified":"2020-04-24T13:17:17","modified_gmt":"2020-04-24T12:17:17","slug":"data-security-with-remote-teams","status":"publish","type":"post","link":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/","title":{"rendered":"Keeping Data Security Intact with Remote Teams"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Data security is always top of mind, but as staffing and recruiting companies put processes in place to keep their teams active in their own homes, the topic is in the spotlight again.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400\">Tommy Donnelly, Bullhorn\u2019s SVP of Information Productivity and Security, answers a few of the frequently asked questions we\u2019re hearing from clients as many people adjust to remote workforces.\u00a0<\/span><\/p>\n<h3><b>What rules or expectations should I put in place in regards to using personal devices now at home?<\/b><\/h3>\n<p><span style=\"font-weight: 400\">First, the golden rule is do not use your personal device unless it\u2019s an absolute emergency and you get approval from your manager. When using a personal device, try to enforce the same security precautions that are enforced at your workplace. For instance, make sure your software has all recent security patches and your antivirus software is updated. And make sure you follow the same complexity requirements for passwords for your home device as work.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A recent study from PwC stated that 99% of corporate attacks originate from phishing emails. Continue to be diligent with your business email AND your personal email. Clicking on malicious links puts your identity and company data at risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Do not download any work documents to your personal computer. Utilize cloud-based software like Google Drive and other solutions to keep any data from being stored on your local computer.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Always create a non-admin account on your computer for every use and work. Only use the administrator account when installing software. This will make it more difficult for a malicious attacker to install unwanted malware on your computer if the interactive user does not have administrator access.<\/span><\/p>\n<h3><b>Should I be nervous about others being present for work-related conversations?<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Absolutely. Most conversations for work are considered controlled or confidential. Do your best to find a quiet place to work away from other members of your household. Especially when you are having conversations about data or personnel. It is important to respect your employees and clients\u2019 privacy.<\/span><\/p>\n<h3><b>There are a lot of connectivity apps (ex: Zoom, WhatsApp, House Party) now being used to help people stay connected. Does this cause any concern?<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Limit your connectivity app usage to approved applications for business purposes. If you have a question about a specific application, reach out to your corporate IT or security department.<\/span><\/p>\n<h3><b>Any other suggestions you have for companies to help their employees stay secure?<\/b><\/h3>\n<p><span style=\"font-weight: 400\">First, there needs to be a company culture that security is every employee&#8217;s job. Arm your employees with knowledge. Continuous dialogue from the security team to educate all employees (including remote users) about new and emerging threats is critical. For instance, there is a massive uptick in malicious websites or phishing emails impersonating legitimate sources using the recent COVID pandemic to entice clicks. People need to know what they are up against to help them make security-minded decisions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Bullhorn is continuing to keep a pulse on the current environment. Visit our resource center for updated content and information.\u00a0<\/span><\/p>\n<hr \/>\n<p><em>Looking for more COVID-19 resources and information for staffing and recruitment agencies? Go to our <a href=\"https:\/\/www.bullhorn.com\/covid-19-resources\/\">resource hub<\/a> to find the most up-to-date content, government guidance, data, and webinars to keep you informed and to help your staffing firm navigate the COVID-19 pandemic.<br \/>\n<\/em><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data security is always top of mind, but as staffing and recruiting companies put processes in place to keep their teams active in their own homes, the topic is in the spotlight again.\u00a0 Tommy Donnelly, Bullhorn\u2019s SVP of Information Productivity and Security, answers a few of the frequently asked questions we\u2019re hearing from clients as [&hellip;]<\/p>\n","protected":false},"author":153,"featured_media":63475,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"om_disable_all_campaigns":false,"footnotes":""},"categories":[585],"tags":[],"class_list":["post-63474","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-tips-tricks-and-how-tos"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.2 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Keeping Data Security Intact with Remote Teams - Bullhorn EU<\/title>\n<meta name=\"description\" content=\"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Keeping Data Security Intact with Remote Teams - Bullhorn EU\" \/>\n<meta property=\"og:description\" content=\"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\" \/>\n<meta property=\"og:site_name\" content=\"Bullhorn EU\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Bullhorn\/\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-02T14:01:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-04-24T12:17:17+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"667\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Leah McKelvey\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Leah McKelvey\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\"},\"author\":{\"name\":\"Leah McKelvey\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#\/schema\/person\/513208d7746c4d24f21ebfb190dcf7dc\"},\"headline\":\"Keeping Data Security Intact with Remote Teams\",\"datePublished\":\"2020-04-02T14:01:11+00:00\",\"dateModified\":\"2020-04-24T12:17:17+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\",\"articleSection\":[\"Tips, Tricks, and How-Tos\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\",\"url\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\",\"name\":\"Keeping Data Security Intact with Remote Teams - Bullhorn EU\",\"isPartOf\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\",\"datePublished\":\"2020-04-02T14:01:11+00:00\",\"dateModified\":\"2020-04-24T12:17:17+00:00\",\"description\":\"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage\",\"url\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\",\"contentUrl\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\",\"width\":1000,\"height\":667},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#website\",\"url\":\"https:\/\/www.bullhorn.com\/eu\/\",\"name\":\"Bullhorn EU\",\"description\":\"Applicant Tracking &amp; Recruiting Software\",\"publisher\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.bullhorn.com\/eu\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#organization\",\"name\":\"Bullhorn\",\"url\":\"https:\/\/www.bullhorn.com\/eu\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2021\/09\/og-img.png\",\"contentUrl\":\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2021\/09\/og-img.png\",\"width\":1200,\"height\":628,\"caption\":\"Bullhorn\"},\"image\":{\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/Bullhorn\/\",\"https:\/\/x.com\/Bullhorn\",\"https:\/\/www.instagram.com\/lifeatbullhorn\/?hl=eu\",\"https:\/\/www.linkedin.com\/company\/bullhorn\",\"https:\/\/www.youtube.com\/channel\/UC-Rgm5YxtoxsvlCHy6KW3Ug\",\"https:\/\/en.wikipedia.org\/wiki\/Bullhorn,_Inc.\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.bullhorn.com\/eu\/#\/schema\/person\/513208d7746c4d24f21ebfb190dcf7dc\",\"name\":\"Leah McKelvey\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g\",\"caption\":\"Leah McKelvey\"},\"description\":\"Leah McKelvey is RVP, Enterprise EMEA. Before joining Bullhorn in 2017, Leah spent nearly 9 years in marketing strategy and leadership for CareerBuilder\u2019s Staffing and Recruiting Group in North America. She then joined ClearEdge Marketing to serve in both business development and strategy roles for clients in the talent management ecosystem, from HR tech to staffing to MSP. Educated in the states, Leah earned her Bachelor\u2019s Degree from the University of Notre Dame and her MBA from Northwestern University\u2019s Kellogg School of Management. A travel addict with a severe case of wanderlust, you can find Leah on a plane or thinking about where to go next. Follow Leah on twitter: @LMcKelvey.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/leahmckelvey\/\",\"https:\/\/x.com\/LMcKelvey\"],\"url\":\"https:\/\/www.bullhorn.com\/eu\/blog\/author\/leahmckelvey\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Keeping Data Security Intact with Remote Teams - Bullhorn EU","description":"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/","og_locale":"en_US","og_type":"article","og_title":"Keeping Data Security Intact with Remote Teams - Bullhorn EU","og_description":"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0","og_url":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/","og_site_name":"Bullhorn EU","article_publisher":"https:\/\/www.facebook.com\/Bullhorn\/","article_published_time":"2020-04-02T14:01:11+00:00","article_modified_time":"2020-04-24T12:17:17+00:00","og_image":[{"width":1000,"height":667,"url":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg","type":"image\/jpeg"}],"author":"Leah McKelvey","twitter_misc":{"Written by":"Leah McKelvey","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#article","isPartOf":{"@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/"},"author":{"name":"Leah McKelvey","@id":"https:\/\/www.bullhorn.com\/eu\/#\/schema\/person\/513208d7746c4d24f21ebfb190dcf7dc"},"headline":"Keeping Data Security Intact with Remote Teams","datePublished":"2020-04-02T14:01:11+00:00","dateModified":"2020-04-24T12:17:17+00:00","mainEntityOfPage":{"@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.bullhorn.com\/eu\/#organization"},"image":{"@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg","articleSection":["Tips, Tricks, and How-Tos"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/","url":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/","name":"Keeping Data Security Intact with Remote Teams - Bullhorn EU","isPartOf":{"@id":"https:\/\/www.bullhorn.com\/eu\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage"},"image":{"@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage"},"thumbnailUrl":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg","datePublished":"2020-04-02T14:01:11+00:00","dateModified":"2020-04-24T12:17:17+00:00","description":"Bullhorn\u2019s SVP of Information Productivity and Security answers a few questions from clients as many people adjust to remote workforces.\u00a0","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/#primaryimage","url":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg","contentUrl":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg","width":1000,"height":667},{"@type":"WebSite","@id":"https:\/\/www.bullhorn.com\/eu\/#website","url":"https:\/\/www.bullhorn.com\/eu\/","name":"Bullhorn EU","description":"Applicant Tracking &amp; Recruiting Software","publisher":{"@id":"https:\/\/www.bullhorn.com\/eu\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.bullhorn.com\/eu\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.bullhorn.com\/eu\/#organization","name":"Bullhorn","url":"https:\/\/www.bullhorn.com\/eu\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.bullhorn.com\/eu\/#\/schema\/logo\/image\/","url":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2021\/09\/og-img.png","contentUrl":"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2021\/09\/og-img.png","width":1200,"height":628,"caption":"Bullhorn"},"image":{"@id":"https:\/\/www.bullhorn.com\/eu\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/Bullhorn\/","https:\/\/x.com\/Bullhorn","https:\/\/www.instagram.com\/lifeatbullhorn\/?hl=eu","https:\/\/www.linkedin.com\/company\/bullhorn","https:\/\/www.youtube.com\/channel\/UC-Rgm5YxtoxsvlCHy6KW3Ug","https:\/\/en.wikipedia.org\/wiki\/Bullhorn,_Inc."]},{"@type":"Person","@id":"https:\/\/www.bullhorn.com\/eu\/#\/schema\/person\/513208d7746c4d24f21ebfb190dcf7dc","name":"Leah McKelvey","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/be07dee27c4d251eb5ac5a3d6f168a9e2e2adabcad374a2ea02458f46367a591?s=96&d=mm&r=g","caption":"Leah McKelvey"},"description":"Leah McKelvey is RVP, Enterprise EMEA. Before joining Bullhorn in 2017, Leah spent nearly 9 years in marketing strategy and leadership for CareerBuilder\u2019s Staffing and Recruiting Group in North America. She then joined ClearEdge Marketing to serve in both business development and strategy roles for clients in the talent management ecosystem, from HR tech to staffing to MSP. Educated in the states, Leah earned her Bachelor\u2019s Degree from the University of Notre Dame and her MBA from Northwestern University\u2019s Kellogg School of Management. A travel addict with a severe case of wanderlust, you can find Leah on a plane or thinking about where to go next. Follow Leah on twitter: @LMcKelvey.","sameAs":["https:\/\/www.linkedin.com\/in\/leahmckelvey\/","https:\/\/x.com\/LMcKelvey"],"url":"https:\/\/www.bullhorn.com\/eu\/blog\/author\/leahmckelvey\/"}]}},"grav_blocks":null,"card_markup":"<a class=\"card-resource\" href=\"https:\/\/www.bullhorn.com\/eu\/blog\/data-security-with-remote-teams\/\">\n\t\t\t<div aria-hidden=\"true\" class=\"card-resource__image-container\">\n\t\t\t<img class=\"card-resource__image\" alt=\"shutterstock_431935282\" title=\"shutterstock_431935282\" src=\"https:\/\/www.bullhorn.com\/eu\/wp-content\/uploads\/sites\/21\/2020\/04\/shutterstock_431935282.jpg\" \/>\t\t<\/div>\n\t\t\t<div class=\"card-resource__content\">\n\t\t\t\t\t<span class=\"card-resource__category\">Tips, Tricks, and How-Tos<\/span>\n\t\t\t\t\t<h5 class=\"card-resource__title\">Keeping Data Security Intact with Remote Teams<\/h5>\n\t\t\t<\/div>\n<\/a>\n","_links":{"self":[{"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/posts\/63474","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/users\/153"}],"replies":[{"embeddable":true,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/comments?post=63474"}],"version-history":[{"count":0,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/posts\/63474\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/media\/63475"}],"wp:attachment":[{"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/media?parent=63474"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/categories?post=63474"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.bullhorn.com\/eu\/wp-json\/wp\/v2\/tags?post=63474"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}