{"id":2525,"date":"2020-07-14T11:00:11","date_gmt":"2020-07-14T15:00:11","guid":{"rendered":"https:\/\/www.produceinventory.com\/blog\/?p=2525"},"modified":"2020-07-14T11:00:11","modified_gmt":"2020-07-14T15:00:11","slug":"pics-in-a-box-security","status":"publish","type":"post","link":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/","title":{"rendered":"PICS in a Box Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"alignleft size-medium wp-image-2125\" src=\"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/10\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg\" alt=\"ransomware word cloud\" width=\"300\" height=\"216\" \/>Sadly, in the past 2-3 years we have had far too many opportunities to help customers recover from Ransomware and other nasty problems due to Internet usage. Most of our customers feel that the PICS in a Box appliance is one of the most important &#8220;pieces of equipment&#8221; their business uses. They want it to be protected from hackers, and in the event it is damaged, compromised, stolen or destroyed, they want to be able to recover as quickly as possible.<\/p>\n<p>The following are some recommendations as to how you can make a PICS in a Box appliance more resistant to compromise (hacking, ransomware, viruses, etc.), as well as information about backing up the system, in the event a restore needs to be done.<\/p>\n<p><strong>Many of these suggestions would be applicable to all systems in your business.<\/strong><\/p>\n<p>Please be aware that recovering data\/systems is time consuming, costly and a major disruption to your business. You should do whatever you can to protect your systems from being hacked, as well as have a solid recovery plan in the event they are.<\/p>\n<h2>Safeguarding PICS in a Box<\/h2>\n<p><strong><u>Don\u2019t expose RDP to the internet at large<\/u><\/strong>\u00a0\u2013 limit access to the PICS in a Box appliance to only allow specific IP addresses to connect to it. If you want to use a VPN, please see the information in\u00a0<strong>Remote Support Policy<\/strong>, by pressing F1 in PICS and searching for &#8220;Remote Support Policy&#8221;.<\/p>\n<p><strong><u>Limit access to the PICS in a Box appliance from other systems<\/u><\/strong>\u00a0&#8211; Turn on the local windows firewall, and create rules specific for communications on the internal network. Beyond Remote Desktop (RDP) access there should be little or no need for users working on other systems to access anything on the PICS in a Box appliance. In some cases, a domain login script mapping may be set up for users to access their PICS \u201chome\u201d folder. This is located at d:\\ww\\wwusers\\xxxxxx\\prodrun where xxxxxx is the user\u2019s windows user id. Note that it is a WaudWare standard to map a Y: drive to that location for each user.<\/p>\n<p><strong><u>Anti-Virus<\/u><\/strong>\u00a0&#8211; You should use Anti-Virus software on the PICS in a Box appliance. If you have trouble with the one you use, you can use the Microsoft Security Essentials (Anti-Virus for PICS in a Box) Firewall (<a href=\"https:\/\/www.microsoft.com\/en-ca\/download\/details.aspx?id=5201\">https:\/\/www.microsoft.com\/en-ca\/download\/details.aspx?id=5201<\/a>). Regardless as to which Anti-Virus software you use, please be sure to set up the exclusions we recommend in our\u00a0<strong>Anti-Virus software and Anti-Virus exclusions<\/strong>\u00a0document, available in PICS Help.<\/p>\n<p><strong><u>Internet surfing on the PICS in a Box appliance<\/u><\/strong>\u00a0&#8211; With regard to Internet Browsers, we recommend that you configure the Gateway firewall to only allow users on the PICS in a Box appliance to access the PICS Help website and not let users go anywhere else on the internet.<\/p>\n<p><strong><u>Email on PICS in a Box appliance<\/u><\/strong>\u00a0&#8211; Make sure that the PICS in a Box appliance is only configured for outgoing email. Press F1 in PICS and search for <strong>Sending email from WaudWare software &#8211; CodeRunner, EmFx, PRE and WebPICS<\/strong>. Further, email clients such as Outlook should not be installed on the PICS in a Box appliance. In the event that you require an email client on the PICS in a Box appliance, we strongly recommend it be used for outgoing email only.<\/p>\n<p><strong><u>Backup<\/u><\/strong>\u00a0&#8211; Make sure that the system is being backed up properly. There are 2 backups which must be run daily, and many of our customer as well as us at WaudWare have additional backup systems beyond these. Search for\u00a0<strong>CopyPICS<\/strong>\u00a0and\u00a0<strong>Data Replication software<\/strong>\u00a0in PICS Help for more information. Simply hit F1 when you&#8217;re logged in to PICS.<\/p>\n<p><strong>PICS Help<\/strong> is loaded with helpful information tailored for new and practiced PICS Users. PICS Help provides users with in-depth knowledge and understanding of screens, procedures and reports found in our Produce Inventory Control System (<a href=\"https:\/\/www.produceinventory.com\/produce-inventory-control-system.html\">PICS<\/a>) software. Go PICS!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Sadly, in the past 2-3 years we have had far too many opportunities to help customers recover from Ransomware and other nasty problems due to Internet usage. Most of our customers feel that the PICS in a Box appliance is one of the most important &#8220;pieces of equipment&#8221; their business uses. They want it to &#8230; <a title=\"PICS in a Box Security\" class=\"read-more\" href=\"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/\" aria-label=\"Read more about PICS in a Box Security\">Read more<\/a><\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,5],"tags":[884,1064,1352],"class_list":["post-2525","post","type-post","status-publish","format-standard","hentry","category-stuff-were-working-on","category-your-faqs","tag-pics-in-a-box","tag-safeguarding-software","tag-waudware","infinite-scroll-item","masonry-post","generate-columns","tablet-grid-50","mobile-grid-100","grid-parent","grid-50","no-featured-image-padding"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Safeguarding Software from Ransomware Viruses WaudWare<\/title>\n<meta name=\"description\" content=\"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Safeguarding Software from Ransomware Viruses WaudWare\" \/>\n<meta property=\"og:description\" content=\"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/\" \/>\n<meta property=\"og:site_name\" content=\"Produce Inventory Control System Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ProduceInventory\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-14T15:00:11+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/10\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg\" \/>\n<meta name=\"author\" content=\"Wendy Marlow\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/\"},\"author\":{\"name\":\"Wendy Marlow\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\"},\"headline\":\"PICS in a Box Security\",\"datePublished\":\"2020-07-14T15:00:11+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/\"},\"wordCount\":667,\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg\",\"keywords\":[\"PICS in a Box\",\"safeguarding software\",\"WaudWare\"],\"articleSection\":[\"Improving Your Business\",\"Your FAQs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/\",\"name\":\"Safeguarding Software from Ransomware Viruses WaudWare\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2018\\\/10\\\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg\",\"datePublished\":\"2020-07-14T15:00:11+00:00\",\"description\":\"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#primaryimage\",\"url\":\"\",\"contentUrl\":\"\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/pics-in-a-box-security\\\/2020\\\/07\\\/14\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"PICS in a Box Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"name\":\"Produce Inventory Control System Blog\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#organization\",\"name\":\"Produce Inventory Control System Blog\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"contentUrl\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/wp-content\\\/uploads\\\/sites\\\/2\\\/2025\\\/03\\\/produce-inventory-control-system-logo.png\",\"width\":217,\"height\":75,\"caption\":\"Produce Inventory Control System Blog\"},\"image\":{\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/ProduceInventory\",\"https:\\\/\\\/www.youtube.com\\\/@PICS-Software\\\/videos\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/fcharleswaud\\\/\",\"https:\\\/\\\/www.instagram.com\\\/waudwarepics\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/#\\\/schema\\\/person\\\/7c961d4eb41d79fb1adae194ba4ea36a\",\"name\":\"Wendy Marlow\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g\",\"caption\":\"Wendy Marlow\"},\"url\":\"https:\\\/\\\/www.produceinventory.com\\\/blog\\\/author\\\/wendymarlow\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Safeguarding Software from Ransomware Viruses WaudWare","description":"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/","og_locale":"en_US","og_type":"article","og_title":"Safeguarding Software from Ransomware Viruses WaudWare","og_description":"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS","og_url":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/","og_site_name":"Produce Inventory Control System Blog","article_publisher":"https:\/\/www.facebook.com\/ProduceInventory","article_published_time":"2020-07-14T15:00:11+00:00","og_image":[{"url":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/10\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg","type":"","width":"","height":""}],"author":"Wendy Marlow","twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#article","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/"},"author":{"name":"Wendy Marlow","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a"},"headline":"PICS in a Box Security","datePublished":"2020-07-14T15:00:11+00:00","mainEntityOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/"},"wordCount":667,"publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#primaryimage"},"thumbnailUrl":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/10\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg","keywords":["PICS in a Box","safeguarding software","WaudWare"],"articleSection":["Improving Your Business","Your FAQs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/","url":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/","name":"Safeguarding Software from Ransomware Viruses WaudWare","isPartOf":{"@id":"https:\/\/www.produceinventory.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#primaryimage"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#primaryimage"},"thumbnailUrl":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2018\/10\/bigstock-Ransomware-Virus-Compromised-250759627-300x216.jpg","datePublished":"2020-07-14T15:00:11+00:00","description":"Here are some of the steps you can take to safeguard your software and protect your most valuable asset - your information. By WaudWare creators of PICS","breadcrumb":{"@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#primaryimage","url":"","contentUrl":""},{"@type":"BreadcrumbList","@id":"https:\/\/www.produceinventory.com\/blog\/pics-in-a-box-security\/2020\/07\/14\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.produceinventory.com\/blog\/"},{"@type":"ListItem","position":2,"name":"PICS in a Box Security"}]},{"@type":"WebSite","@id":"https:\/\/www.produceinventory.com\/blog\/#website","url":"https:\/\/www.produceinventory.com\/blog\/","name":"Produce Inventory Control System Blog","description":"","publisher":{"@id":"https:\/\/www.produceinventory.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.produceinventory.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.produceinventory.com\/blog\/#organization","name":"Produce Inventory Control System Blog","url":"https:\/\/www.produceinventory.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","contentUrl":"https:\/\/www.produceinventory.com\/blog\/wp-content\/uploads\/sites\/2\/2025\/03\/produce-inventory-control-system-logo.png","width":217,"height":75,"caption":"Produce Inventory Control System Blog"},"image":{"@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/ProduceInventory","https:\/\/www.youtube.com\/@PICS-Software\/videos","https:\/\/www.linkedin.com\/in\/fcharleswaud\/","https:\/\/www.instagram.com\/waudwarepics"]},{"@type":"Person","@id":"https:\/\/www.produceinventory.com\/blog\/#\/schema\/person\/7c961d4eb41d79fb1adae194ba4ea36a","name":"Wendy Marlow","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/36a7382f04247b01f69499f67fa612c2cda4f45c1dd3c2e9a494be2d9c7a6edf?s=96&d=mm&r=g","caption":"Wendy Marlow"},"url":"https:\/\/www.produceinventory.com\/blog\/author\/wendymarlow\/"}]}},"_links":{"self":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/2525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/comments?post=2525"}],"version-history":[{"count":0,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/posts\/2525\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/media?parent=2525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/categories?post=2525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.produceinventory.com\/blog\/wp-json\/wp\/v2\/tags?post=2525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}