{"id":1370,"date":"2025-11-17T04:39:54","date_gmt":"2025-11-17T10:39:54","guid":{"rendered":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/?p=1370"},"modified":"2025-11-24T04:56:28","modified_gmt":"2025-11-24T10:56:28","slug":"the-rise-of-synthetic-identity-fraud-how-hackers-combine-real-and-fake-data","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/blog\/the-rise-of-synthetic-identity-fraud-how-hackers-combine-real-and-fake-data\/","title":{"rendered":"The Rise of Synthetic Identity Fraud: How Hackers Combine Real and Fake Data"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Synthetic identity fraud has emerged as one of the fastest-growing threats in the digital world. Unlike traditional identity theft, which relies on stealing a single person\u2019s information, synthetic identity fraud involves creating a completely new identity using a combination of <\/span><b>real and fabricated data<\/b><span style=\"font-weight: 400\">. This sophisticated method allows fraudsters to exploit financial systems, evade detection, and commit long-term crimes that can cost businesses billions annually.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this blog, we explore how synthetic identity fraud works, its impact on businesses and consumers, and strategies to detect, prevent, and respond to this evolving threat.<\/span><\/p>\n<h2><b>What is Synthetic Identity Fraud?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Synthetic identity fraud occurs when criminals merge <\/span><b>real personal data<\/b><span style=\"font-weight: 400\">, such as Social Security numbers or partial credit histories, with fictitious details like names, birthdates, and addresses. The resulting synthetic identity may appear legitimate to financial institutions and businesses, enabling hackers to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Open credit accounts<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Take out loans<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conduct large-scale financial transactions<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Evade traditional fraud detection systems<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Unlike conventional identity theft, victims may not even know their information has been misused until significant damage occurs. Businesses implementing robust<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/cybersecurity\"> <span style=\"font-weight: 400\">cybersecurity<\/span><\/a><span style=\"font-weight: 400\"> strategies can reduce exposure to this type of fraud.<\/span><\/p>\n<h2><b>How Hackers Create Synthetic Identities<\/b><\/h2>\n<h3><b>1. Collecting Real Data<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Fraudsters often gather real personal data from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data breaches<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Phishing campaigns<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Public records or social media platforms<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This authentic data forms the foundation for creating credible synthetic identities. Companies leveraging<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-guidance\"> <span style=\"font-weight: 400\">IT guidance<\/span><\/a><span style=\"font-weight: 400\"> can implement employee training and monitoring to reduce internal and external data leakage.<\/span><\/p>\n<h3><b>2. Fabricating Additional Details<\/b><\/h3>\n<p><span style=\"font-weight: 400\">To make the synthetic identity functional, criminals fabricate additional information such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Names and addresses<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Birthdates<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employment details<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These details are combined with real identifiers to build an identity that appears legitimate to financial and verification systems.<\/span><\/p>\n<h3><b>3. Establishing Credit Profiles<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Once the identity is created, fraudsters may apply for small lines of credit, gradually building a positive credit history. Over time, this synthetic identity gains credibility, allowing larger fraudulent transactions. Monitoring and<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/managed-services\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\"> can help financial institutions track anomalies in credit application patterns.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1372\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-09-22T022255.922-1024x535.png\" alt=\"\" width=\"771\" height=\"403\" srcset=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-09-22T022255.922-1024x535.png 1024w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-09-22T022255.922-300x157.png 300w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-09-22T022255.922-768x401.png 768w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-09-22T022255.922.png 1200w\" sizes=\"(max-width: 771px) 100vw, 771px\" \/><\/p>\n<h2><b>Why Synthetic Identity Fraud is Increasing<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Several factors have contributed to the rise of synthetic identity fraud:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Advanced Technology:<\/b><span style=\"font-weight: 400\"> AI and automation make it easier to generate realistic identities.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Partial Verification Loopholes:<\/b><span style=\"font-weight: 400\"> Systems that only check certain identity elements allow fraud to bypass traditional security checks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>High Financial Incentives:<\/b><span style=\"font-weight: 400\"> Synthetic fraud can result in significant financial gains with lower detection risk.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Lack of Awareness:<\/b><span style=\"font-weight: 400\"> Businesses and consumers often underestimate the prevalence of synthetic identity fraud.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Implementing proactive<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-support\"> <span style=\"font-weight: 400\">IT support<\/span><\/a><span style=\"font-weight: 400\"> and<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/network-management\"> <span style=\"font-weight: 400\">network management<\/span><\/a><span style=\"font-weight: 400\"> solutions can help businesses detect unusual patterns before they escalate.<\/span><\/p>\n<h2><b>The Impact on Businesses<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Synthetic identity fraud impacts organizations across multiple sectors:<\/span><\/p>\n<h3><b>Financial Losses<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Banks, credit unions, and lenders may face losses from unpaid loans and fraudulent accounts. The complex nature of synthetic identities makes recovery challenging.<\/span><\/p>\n<h3><b>Compliance and Regulatory Risks<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Organizations that fail to detect synthetic identity fraud may face <\/span><b>regulatory penalties<\/b><span style=\"font-weight: 400\">. Compliance-focused<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-guidance\"> <span style=\"font-weight: 400\">IT guidance<\/span><\/a><span style=\"font-weight: 400\"> ensures data handling and verification processes meet legal standards.<\/span><\/p>\n<h3><b>Reputation Damage<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Repeated fraud incidents can harm customer trust and corporate reputation, affecting retention and growth.<\/span><\/p>\n<h3><b>Operational Strain<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Fraud detection, investigations, and remediation require additional resources, impacting operational efficiency. Businesses using<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/cloud-services\"> <span style=\"font-weight: 400\">cloud services<\/span><\/a><span style=\"font-weight: 400\"> can deploy scalable analytics platforms to manage fraud investigations effectively.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1373\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-22-1024x535.png\" alt=\"\" width=\"741\" height=\"387\" srcset=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-22-1024x535.png 1024w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-22-300x157.png 300w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-22-768x401.png 768w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/11\/Copy-of-cmit-boise-featured-image-22.png 1200w\" sizes=\"(max-width: 741px) 100vw, 741px\" \/><\/p>\n<h2><b>How to Detect Synthetic Identity Fraud<\/b><\/h2>\n<h3><b>Monitor Unusual Behavior Patterns<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Synthetic identities often display irregularities such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent application details<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multiple accounts linked to the same Social Security number<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rapid accumulation of credit<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Integrating<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/managed-services\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\"> ensures continuous monitoring and real-time alerting.<\/span><\/p>\n<h3><b>Use Advanced Verification Methods<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Employ multi-factor authentication, identity verification software, and AI-powered fraud detection tools. This approach helps distinguish between genuine and synthetic identities.<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/tech-strategy-for-growth-the-role-of-it-consulting-in-birminghams-smb-success\"> <span style=\"font-weight: 400\">IT consulting<\/span><\/a><span style=\"font-weight: 400\"> can guide businesses in selecting the right tools and technologies.<\/span><\/p>\n<h3><b>\u00a0Leverage Data Analytics<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Analyzing large datasets can reveal subtle patterns indicative of synthetic fraud, such as repeated address anomalies or unusual transaction volumes. Integrating<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/data-backup\"> <span style=\"font-weight: 400\">data backup<\/span><\/a><span style=\"font-weight: 400\"> ensures data integrity for ongoing analytics.<\/span><\/p>\n<h3><b>Collaborate with Industry Partners<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Sharing threat intelligence across financial institutions, credit bureaus, and cybersecurity networks improves early detection and prevention.<\/span><\/p>\n<h2><b>Prevention Strategies for Businesses<\/b><\/h2>\n<h3><b>Employee Education and Training<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Educate employees about phishing attacks, social engineering, and the risks of sharing sensitive information.<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-guidance\"> <span style=\"font-weight: 400\">IT guidance<\/span><\/a><span style=\"font-weight: 400\"> services can provide structured training programs.<\/span><\/p>\n<h3><b>Implement Multi-Layered Cybersecurity<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Combine firewalls, endpoint security, encryption, and real-time monitoring to reduce the likelihood of data breaches.<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/cybersecurity\"> <span style=\"font-weight: 400\">Cybersecurity<\/span><\/a><span style=\"font-weight: 400\"> frameworks integrated with proactive<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-support\"> <span style=\"font-weight: 400\">IT support<\/span><\/a><span style=\"font-weight: 400\"> reduce overall exposure.<\/span><\/p>\n<h3><b>Validate New Accounts Thoroughly<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Require enhanced verification for new accounts or high-value transactions. Cross-check all identifiers using internal and third-party verification systems.<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/network-management\"> <span style=\"font-weight: 400\">Network management<\/span><\/a><span style=\"font-weight: 400\"> tools can track abnormal account creation patterns.<\/span><\/p>\n<h3><b>Deploy AI and Machine Learning<\/b><\/h3>\n<p><span style=\"font-weight: 400\">AI models can predict fraud probability by analyzing historical data and transaction patterns. Synthetic identity fraud detection is highly effective when combined with<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/managed-services\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\"> and automated workflows.<\/span><\/p>\n<h2><b>Responding to Synthetic Identity Fraud<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Despite prevention measures, some fraudulent activity may occur. Businesses should:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400\"><b>Act Quickly:<\/b><span style=\"font-weight: 400\"> Isolate affected accounts and prevent further transactions.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Notify Authorities:<\/b><span style=\"font-weight: 400\"> Report incidents to regulatory and law enforcement agencies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Audit Processes:<\/b><span style=\"font-weight: 400\"> Identify weaknesses in verification, monitoring, and employee practices.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Recover Data and Assets:<\/b><span style=\"font-weight: 400\"> Use<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/data-backup\"> <span style=\"font-weight: 400\">data backup<\/span><\/a><span style=\"font-weight: 400\"> and forensic analysis to restore systems and protect legitimate users.<\/span><\/li>\n<\/ol>\n<h2><b>The Future of Synthetic Identity Fraud<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Synthetic identity fraud is expected to grow as hackers adopt <\/span><b>AI-generated data, deepfakes, and automation<\/b><span style=\"font-weight: 400\"> to create even more convincing identities. Businesses that fail to implement advanced fraud detection and proactive IT strategies will remain vulnerable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Investing in<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/managed-services\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\">,<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/cybersecurity\"> <span style=\"font-weight: 400\">cybersecurity<\/span><\/a><span style=\"font-weight: 400\">, and<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/tech-strategy-for-growth-the-role-of-it-consulting-in-birminghams-smb-success\"> <span style=\"font-weight: 400\">IT consulting<\/span><\/a><span style=\"font-weight: 400\"> now will help organizations stay ahead of emerging threats and reduce financial and operational risk.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Synthetic identity fraud represents a <\/span><b>sophisticated and growing threat<\/b><span style=\"font-weight: 400\"> that combines real and fake data to bypass traditional detection methods. Businesses must adopt multi-layered cybersecurity measures, advanced analytics, and employee training programs to combat this risk effectively.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By partnering with<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/managed-services\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\"> providers, leveraging<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/cloud-services\"> <span style=\"font-weight: 400\">cloud services<\/span><\/a><span style=\"font-weight: 400\">, and implementing robust<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/network-management\"> <span style=\"font-weight: 400\">network management<\/span><\/a><span style=\"font-weight: 400\"> and<\/span><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/it-guidance\"> <span style=\"font-weight: 400\">IT guidance<\/span><\/a><span style=\"font-weight: 400\">, companies can detect, prevent, and respond to synthetic identity fraud while safeguarding assets and customer trust.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive action today will minimize exposure, protect brand reputation, and ensure long-term operational resilience in an increasingly digital and fraud-prone world.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-621\" src=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-content\/uploads\/sites\/133\/2025\/06\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Synthetic identity fraud has emerged as one of the fastest-growing threats in&#8230;<\/p>\n","protected":false},"author":1047,"featured_media":1371,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[44,60,21,26,33,27,69,29,47,68,43,56,49,51,74,57,73],"class_list":["post-1370","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-birmingham-ai-services","tag-custom-it-support-packages","tag-it-security-strategy","tag-next-gen-cybersecurity","tag-proactive-it-support-birmingham","tag-protecting-business-data","tag-quantum-ready-cybersecurity","tag-ransomware-protection","tag-remote-work-cloud-tools","tag-shadow-it","tag-smart-tools-for-smbs","tag-smb-compliance-solutions","tag-smb-security","tag-tech-support-birmingham","tag-technology-adoption","tag-ucaas-birmingham","tag-windows-10-upgrade"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts\/1370","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/users\/1047"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/comments?post=1370"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/posts\/1370\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/media\/1371"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/media?parent=1370"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/categories?post=1370"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/birmingham-al-1149\/wp-json\/wp\/v2\/tags?post=1370"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}