{"id":2288,"date":"2013-04-03T16:47:13","date_gmt":"2013-04-03T20:47:13","guid":{"rendered":"https:\/\/www.myassettag.com\/blog\/?p=2288"},"modified":"2013-04-03T16:47:13","modified_gmt":"2013-04-03T20:47:13","slug":"asset-disposal-security","status":"publish","type":"post","link":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/","title":{"rendered":"Asset disposal security: an IT no-brainer"},"content":{"rendered":"<p>Which has more value: an armored truck or a van carting away a bunch of old computers? This is not a trick question. It\u2019s one that Kyle Marks, founder and CEO of <a href=\"https:\/\/retire-it.com\/\" rel=\"nofollow\">Retire-IT<\/a>, asks his clients. And the answer is easy, says the Columbus, Ohio-based entrepreneur, but it eludes most businesses. \u201cThe armored truck might, on average, carry a few hundred thousand dollars, and it has armed guards,\u201d he says, but \u201ca recycler\u2019s van full of obsolete IT equipment carries millions of dollars of liability.\u201d<\/p>\n<p>\u201cThis is the most overlooked aspect of IT security,\u201d he contends. \u201cCompanies spend millions of dollars to protect their IT assets while they\u2019re in use.\u201d When these assets are retired, they contain all the same information , but, he contends, companies take the security aspects of disposal pretty much on faith.<\/p>\n<div id=\"attachment_2292\" style=\"width: 423px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2292\" class=\"size-full wp-image-2292 \" alt=\"Electronic waste\" src=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg\" width=\"413\" height=\"291\" srcset=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg 413w, https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste-300x211.jpg 300w\" sizes=\"auto, (max-width: 413px) 100vw, 413px\" \/><\/a><p id=\"caption-attachment-2292\" class=\"wp-caption-text\">Companies spend millions on IT security, but forget that when they toss old computers without a plan, they&#8217;re sustaining huge liability.<\/p><\/div>\n<p>Not that he\u2019s advocating hiring Brinks to cart away used servers. What he does recommend is a simple procedure that involves labeling every asset that is to be retired with a unique tag \u00a0marked for disposal, and then implementing a comprehensive \u201creconciliation methodology\u201d to ensure that the data is destroyed and the\u00a0 hardware goes where the company wants it to.<\/p>\n<p>It\u2019s the ounce of prevention that can make all the difference, says Marks, who earned his MBA from Harvard. All it takes is one hard drive that goes missing. If that drive contains sensitive client records, suddenly a worn-out piece of hardware can become a costly liability that he contends \u201ccould put a company out of business.\u201d<\/p>\n<p>It\u2019s true that while <a href=\"https:\/\/www.ibtimes.com\/us-companies-china-distrust-cybersecurity-efforts-claim-data-breaches-1161119\" rel=\"nofollow\">data<\/a> <a href=\"https:\/\/www.spamfighter.com\/News-18266-SSU-Warned-25000-Students-and-Staff-Members-of-Data-Security-Breach.htm\" rel=\"nofollow\">security<\/a> <a href=\"https:\/\/www.csoonline.com\/article\/730862\/the-state-of-data-breaches\" rel=\"nofollow\">breaches<\/a> have become commonplace, most of the resulting class action suits to date have not been successful. Plaintiffs\u2019 claims that they have been subjected to increased risk because of asset disposal breaches have been viewed dimly by the courts; in most cases actual damages are required in order to qualify for class action status. But the judiciary\u2019s take on such cases has been evolving bit by bit, and class action strategies have become more sophisticated, which leaves companies vulnerable. An ounce of prevention, says Marks, is well worth it.<\/p>\n<div id=\"attachment_2295\" style=\"width: 210px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Kyle-Marks-CEO-Retire-IT.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2295\" class=\"size-full wp-image-2295 \" alt=\"Kyle Marks, CEO of Retire-IT\" src=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Kyle-Marks-CEO-Retire-IT.jpg\" width=\"200\" height=\"200\" srcset=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Kyle-Marks-CEO-Retire-IT.jpg 200w, https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Kyle-Marks-CEO-Retire-IT-150x150.jpg 150w\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" \/><\/a><p id=\"caption-attachment-2295\" class=\"wp-caption-text\">Kyle Marks, CEO of Retire-IT, says an ounce of prevention is well worthwhile.<\/p><\/div>\n<p>In his view, companies don\u2019t need to target the recycling contractors. Most pilferage of obsolete hardware takes place, he maintains, before the recyclers ever set foot in the door. It\u2019s the \u201ctrusted insiders\u201d on the IT staff who are usually responsible, he says. \u201cThey view it as a victimless crime,\u201d and help themselves to a piece of equipment that they know is destined for the dump. The problem is that if the data on these machines has not been wiped clean, who knows where it might eventually end up.<\/p>\n<p>The solution, says Marks, lies in identifying the assets\u00a0 every step of the way. And that\u2019s where he says disposal tags come in. This is a departure from common practice. The traditional tracking tool has been the serial number on the piece of hardware, but Marks says serial numbers are subject to human error in transcription. Get one character wrong, and the asset becomes unidentifiable. With a bar-coded disposal tag, the scanner does the recording, and human error is no longer part of the equation, he says.<\/p>\n<div id=\"attachment_2294\" style=\"width: 450px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Disposal-only-tag.jpg\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-2294\" class=\"size-full wp-image-2294 \" alt=\"disposal only tag\" src=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Disposal-only-tag.jpg\" width=\"440\" height=\"200\" srcset=\"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Disposal-only-tag.jpg 440w, https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/Disposal-only-tag-300x136.jpg 300w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/a><p id=\"caption-attachment-2294\" class=\"wp-caption-text\">A simple asset tag can help prevent data piracy and lawsuits when IT paraphernalia is in retirement. Via <a href=\"https:\/\/www.myassettag.com\/alumiguard-metal-asset-tags\">myassettag.com<\/a>.<\/p><\/div>\n<p>But why not use the <a href=\"https:\/\/www.myassettag.com\/\">asset tags<\/a> that many companies assign to each piece of hardware when it is\u00a0 put into service? \u201cWe tell clients that they can use them, but we\u2019ve never found a client that has a consistent, homogeneous system\u201d for asset tagging, Marks says. Plus, older tags are often worn out and unreadable, and sometimes they\u2019re so old that they predate bar coding; asset disposal tags bypass all of these pitfalls.<\/p>\n<p>Marks uses simple one-by-three-inch white self-adhesive polypropylene tags with what he describes as \u201cthe most easily read bar code format.\u201d\u00a0 His clients do their own tagging; this ensures that the correct assets are marked for disposal, and it also acts as a deterrent to the assets disappearing before the recyclers arrive. The tags are used to build a master inventory list that also uses serial numbers as a backup. \u201cIt\u2019s two-key tracking\u2014a complete reconciliation methodology,\u201d\u00a0 Marks explains.<\/p>\n<div class=\"related-products\">\n<h3>Like this topic? Check out our related products:<\/h3>\n<div class=\"slitrule\"><\/div>\n<ul>\n<li>\n<div class=\"wraptocenter\"><a href=\"https:\/\/www.myassettag.com\/property-id-tags\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/img\/src\/spacer.gif\" alt=\"\" \/><br \/>\n<img decoding=\"async\" src=\"https:\/\/images.myassettag.com\/img\/lg\/A\/Custom-Barcode-Tag-AT-3044R-B.jpg\" alt=\"\" style=\"width:150px\" \/><\/a><\/div>\n<p>Property ID Tags\n<\/li>\n<\/ul>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Which has more value: an armored truck or a van carting away a bunch of old computers? This is not a trick question. It\u2019s one that Kyle Marks, founder and CEO of Retire-IT, asks his clients. And the answer is easy, says the Columbus, Ohio-based entrepreneur, but it eludes most businesses. \u201cThe armored truck might, [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":2292,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[4],"tags":[],"class_list":["post-2288","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-bar-codes-and-rfid"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Asset disposal security: an IT no-brainer - MyAssetTag.com Blog<\/title>\n<meta name=\"description\" content=\"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it&#039;s neglected.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Asset disposal security: an IT no-brainer - MyAssetTag.com Blog\" \/>\n<meta property=\"og:description\" content=\"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it&#039;s neglected.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/\" \/>\n<meta property=\"og:site_name\" content=\"MyAssetTag.com Blog\" \/>\n<meta property=\"article:published_time\" content=\"2013-04-03T20:47:13+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/6bi78c.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/IT-waste.jpg?time=1722634647\" \/>\n\t<meta property=\"og:image:width\" content=\"413\" \/>\n\t<meta property=\"og:image:height\" content=\"291\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Karen Berman\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Karen Berman\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/\"},\"author\":{\"name\":\"Karen Berman\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/#\\\/schema\\\/person\\\/b765fa5f9f7ae0d52ab42ade31ab4038\"},\"headline\":\"Asset disposal security: an IT no-brainer\",\"datePublished\":\"2013-04-03T20:47:13+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/\"},\"wordCount\":780,\"commentCount\":0,\"image\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.myassettag.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/IT-waste.jpg\",\"articleSection\":[\"Barcodes and RFID\"],\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/\",\"url\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/\",\"name\":\"Asset disposal security: an IT no-brainer - MyAssetTag.com Blog\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.myassettag.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/IT-waste.jpg\",\"datePublished\":\"2013-04-03T20:47:13+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/#\\\/schema\\\/person\\\/b765fa5f9f7ae0d52ab42ade31ab4038\"},\"description\":\"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it's neglected.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#breadcrumb\"},\"inLanguage\":\"en-CA\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.myassettag.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/IT-waste.jpg\",\"contentUrl\":\"https:\\\/\\\/www.myassettag.com/blog\\\/wp-content\\\/uploads\\\/2013\\\/04\\\/IT-waste.jpg\",\"width\":413,\"height\":291,\"caption\":\"Companies spend millions on IT security, but forget that when they toss old computers without a plan, they're sustaining huge liability.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/asset-disposal-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.myassettag.com/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Asset disposal security: an IT no-brainer\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.myassettag.com/blog\\\/\",\"name\":\"MyAssetTag.com Blog\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.myassettag.com/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-CA\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.myassettag.com/blog\\\/#\\\/schema\\\/person\\\/b765fa5f9f7ae0d52ab42ade31ab4038\",\"name\":\"Karen Berman\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-CA\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g\",\"caption\":\"Karen Berman\"},\"url\":\"https:\\\/\\\/www.myassettag.com/blog\\\/author\\\/karen-berman\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Asset disposal security: an IT no-brainer - MyAssetTag.com Blog","description":"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it's neglected.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/","og_locale":"en_US","og_type":"article","og_title":"Asset disposal security: an IT no-brainer - MyAssetTag.com Blog","og_description":"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it's neglected.","og_url":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/","og_site_name":"MyAssetTag.com Blog","article_published_time":"2013-04-03T20:47:13+00:00","og_image":[{"width":413,"height":291,"url":"https:\/\/6bi78c.p3cdn1.secureserver.net\/wp-content\/uploads\/2013\/04\/IT-waste.jpg?time=1722634647","type":"image\/jpeg"}],"author":"Karen Berman","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Karen Berman","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#article","isPartOf":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/"},"author":{"name":"Karen Berman","@id":"https:\/\/www.myassettag.com/blog\/#\/schema\/person\/b765fa5f9f7ae0d52ab42ade31ab4038"},"headline":"Asset disposal security: an IT no-brainer","datePublished":"2013-04-03T20:47:13+00:00","mainEntityOfPage":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/"},"wordCount":780,"commentCount":0,"image":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg","articleSection":["Barcodes and RFID"],"inLanguage":"en-CA","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/","url":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/","name":"Asset disposal security: an IT no-brainer - MyAssetTag.com Blog","isPartOf":{"@id":"https:\/\/www.myassettag.com/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#primaryimage"},"image":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg","datePublished":"2013-04-03T20:47:13+00:00","author":{"@id":"https:\/\/www.myassettag.com/blog\/#\/schema\/person\/b765fa5f9f7ae0d52ab42ade31ab4038"},"description":"Companies routinely pay millions for IT security, but asset disposal can entail huge liability if it's neglected.","breadcrumb":{"@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#breadcrumb"},"inLanguage":"en-CA","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.myassettag.com/blog\/asset-disposal-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#primaryimage","url":"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg","contentUrl":"https:\/\/www.myassettag.com/blog\/wp-content\/uploads\/2013\/04\/IT-waste.jpg","width":413,"height":291,"caption":"Companies spend millions on IT security, but forget that when they toss old computers without a plan, they're sustaining huge liability."},{"@type":"BreadcrumbList","@id":"https:\/\/www.myassettag.com/blog\/asset-disposal-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.myassettag.com/blog\/"},{"@type":"ListItem","position":2,"name":"Asset disposal security: an IT no-brainer"}]},{"@type":"WebSite","@id":"https:\/\/www.myassettag.com/blog\/#website","url":"https:\/\/www.myassettag.com/blog\/","name":"MyAssetTag.com Blog","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.myassettag.com/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-CA"},{"@type":"Person","@id":"https:\/\/www.myassettag.com/blog\/#\/schema\/person\/b765fa5f9f7ae0d52ab42ade31ab4038","name":"Karen Berman","image":{"@type":"ImageObject","inLanguage":"en-CA","@id":"https:\/\/secure.gravatar.com\/avatar\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49df75c9cde16a8cb1b552a75d37d7f33e74a0b6e081f62b058f3405ca45f12f?s=96&d=mm&r=g","caption":"Karen Berman"},"url":"https:\/\/www.myassettag.com/blog\/author\/karen-berman\/"}]}},"_links":{"self":[{"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/posts\/2288","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/comments?post=2288"}],"version-history":[{"count":0,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/posts\/2288\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/media\/2292"}],"wp:attachment":[{"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/media?parent=2288"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/categories?post=2288"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.myassettag.com/blog\/wp-json\/wp\/v2\/tags?post=2288"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}