{"id":1855,"date":"2025-11-10T23:54:41","date_gmt":"2025-11-11T05:54:41","guid":{"rendered":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/?p=1855"},"modified":"2025-11-21T00:10:55","modified_gmt":"2025-11-21T06:10:55","slug":"the-rise-of-ai-powered-cybercrime-and-how-businesses-can-stay-ahead","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/the-rise-of-ai-powered-cybercrime-and-how-businesses-can-stay-ahead\/","title":{"rendered":"The Rise of AI-Powered Cybercrime and How Businesses Can Stay Ahead"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Artificial intelligence has reshaped modern business operations, driving efficiency, automation, and smarter decision-making. But alongside its benefits comes a darker reality\u00a0 cybercriminals are using AI to launch faster, more adaptive, and more convincing attacks than ever before.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For small and medium-sized businesses, these evolving threats demand a new level of awareness and preparation. AI-powered cybercrime isn\u2019t just a future possibility, it&#8217;s happening now.<\/span><\/p>\n<h2><b>How AI Is Redefining Cybercrime<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyberattacks are no longer limited to human hackers manually exploiting vulnerabilities. Today\u2019s cybercriminals use machine learning to analyze defenses, identify weak points, and generate personalized attacks. These systems continuously learn from every attempt, adapting strategies for greater success.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Examples of AI-driven attacks include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Phishing emails written by natural language models that mimic company tone and style.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Voice cloning and deepfake audio used to impersonate executives in payment requests.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Self-learning malware that alters its code to evade antivirus detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated credential attacks that test stolen passwords at lightning speed.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data poisoning that corrupts AI-driven business models.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These threats highlight why modern<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/multi-layered-security-that-works-strengthening-cyber-defense-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">cyber defense<\/span><\/a><span style=\"font-weight: 400\"> solutions now rely on AI-based threat detection and predictive analytics to counter evolving tactics.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1859\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003656.355-1024x535.png\" alt=\"\" width=\"760\" height=\"397\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003656.355-1024x535.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003656.355-300x157.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003656.355-768x401.png 768w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003656.355.png 1200w\" sizes=\"(max-width: 760px) 100vw, 760px\" \/><\/p>\n<h2><b>The Business Impact of Intelligent Threats<\/b><\/h2>\n<p><span style=\"font-weight: 400\">AI-powered cyberattacks strike faster and target broader networks than traditional hacks. The result: less time to react and greater financial, operational, and reputational damage. <\/span><span style=\"font-weight: 400\">When SMBs experience a breach, the consequences are severe\u00a0 including regulatory penalties, customer distrust, and costly downtime. Even one successful ransomware attack can threaten an entire organization\u2019s stability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Partnering with a trusted<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/the-strategic-value-of-managed-services-how-cmit-solutions-of-bothell-and-renton-fuels-business-growth\/\"> <span style=\"font-weight: 400\">managed IT<\/span><\/a><span style=\"font-weight: 400\"> provider allows businesses to maintain enterprise-level protection without building an in-house cybersecurity department.<\/span><\/p>\n<h2><b>AI as a Double-Edged Sword<\/b><\/h2>\n<p><span style=\"font-weight: 400\">AI doesn\u2019t just fuel cybercrime\u00a0 it also powers modern defense. Advanced cybersecurity systems now use machine learning to detect irregular behavior, block unknown threats, and automate responses before human teams can intervene.<\/span><\/p>\n<p><span style=\"font-weight: 400\">These AI-based defenses can:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Identify abnormal activity across networks in real time.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Recognize patterns that indicate insider threats or phishing attempts.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Quarantine infected files automatically to prevent lateral movement.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use historical data to predict potential breaches before they happen.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Integrating this intelligence through solutions like<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/why-modern-businesses-in-bothell-and-renton-need-siem-tools-like-microsoft-sentinel\/\"> <span style=\"font-weight: 400\">security management<\/span><\/a><span style=\"font-weight: 400\"> helps businesses monitor and respond to attacks with precision and speed.<\/span><\/p>\n<h2><b>The Human Factor in an Automated Threat Landscape<\/b><\/h2>\n<p><span style=\"font-weight: 400\">While technology evolves, human error remains one of the leading causes of breaches. AI-generated phishing emails and deepfake scams are increasingly difficult to recognize, especially without proper employee training.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations can reduce this risk by:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Running regular phishing simulations to build awareness.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Training staff to verify requests before sharing sensitive data.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Promoting strong password habits and multi-factor authentication.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encouraging employees to report suspicious activity immediately.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This proactive approach\u00a0 reinforced by continuous<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/compliance-isnt-optional-why-bothell-small-businesses-need-a-proactive-it-partner-to-stay-audit-ready\/\"> <span style=\"font-weight: 400\">IT compliance<\/span><\/a><span style=\"font-weight: 400\"> and monitoring\u00a0 transforms employees from potential weak points into powerful defenders.<\/span><\/p>\n<h2><b>The Importance of Layered Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Defending against AI-driven threats requires a combination of technologies that work together. A single tool can\u2019t provide total protection; businesses need a security framework that layers multiple defenses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A strong security posture includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Firewalls and intrusion prevention systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Advanced<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/protecting-your-endpoints-why-advanced-edr-matters-for-businesses-in-bothell-and-renton\/\"> <span style=\"font-weight: 400\">endpoint protection<\/span><\/a><span style=\"font-weight: 400\"> for real-time threat detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Email filtering powered by AI to block phishing attempts.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data encryption and role-based access control.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/building-a-reliable-disaster-recovery-plan-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">disaster recovery<\/span><\/a><span style=\"font-weight: 400\"> to restore operations after an attack.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Together, these layers form a resilient defense system capable of detecting, isolating, and responding to emerging threats at every level.<\/span><\/p>\n<h2><b>Securing the Cloud Against AI-Enhanced Attacks<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The cloud offers flexibility and scalability, but it also introduces new risks. AI-driven bots continuously scan for misconfigured cloud storage, weak permissions, and exposed APIs. Businesses using the cloud must adopt a zero-trust mindset to maintain security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Protection strategies should include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Restricting access with least-privilege policies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encrypting sensitive data in transit and at rest.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitoring API usage for anomalies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conducting regular security audits and configuration reviews.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Working with experienced<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/the-cloud-advantage-how-small-businesses-in-bothell-gain-flexibility-and-security-with-managed-cloud-services-2\/\"> <span style=\"font-weight: 400\">cloud services<\/span><\/a><span style=\"font-weight: 400\"> providers ensures these safeguards are applied consistently across every environment.<\/span><\/p>\n<h2><b>Zero Trust: The Foundation of Modern Security<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As cybercriminals use AI to bypass traditional defenses, more organizations are turning to Zero Trust Architecture, a model that assumes every user, device, and application could be compromised.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Zero Trust relies on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous authentication and verification.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strict network segmentation to limit exposure.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time monitoring of all activity.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adaptive access policies based on context.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This principle, combined with advanced<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/beyond-break-fix-why-proactive-it-support-is-the-future-for-bothell-and-renton-businesses\/\"> <span style=\"font-weight: 400\">proactive IT<\/span><\/a><span style=\"font-weight: 400\"> support and endpoint visibility, provides the highest level of defense against evolving AI-based intrusions.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1858\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003726.068-1024x535.png\" alt=\"\" width=\"769\" height=\"402\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003726.068-1024x535.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003726.068-300x157.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003726.068-768x401.png 768w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/11\/Copy-of-cmit-boise-featured-image-2025-11-21T003726.068.png 1200w\" sizes=\"(max-width: 769px) 100vw, 769px\" \/><\/p>\n<h2><b>Building Resilience Through Managed Support<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Preventing AI-driven attacks requires constant vigilance, something most SMBs can\u2019t maintain alone. Managed IT providers deliver ongoing expertise, automation, and infrastructure oversight\u00a0 ensuring no security gap goes unnoticed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Comprehensive services cover:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous monitoring of systems and networks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated patching and software updates.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Advanced analytics for early threat detection.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular security reviews and performance reports.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">With<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/multi-layered-security-that-works-strengthening-cyber-defense-with-cmit-solutions-of-bothell-and-renton\/\"> <span style=\"font-weight: 400\">cyber defense<\/span><\/a><span style=\"font-weight: 400\"> integrated into daily operations, businesses stay protected while focusing on growth and innovation.<\/span><\/p>\n<h2><b>Preparing for the Future of Cyber Threats<\/b><\/h2>\n<p><span style=\"font-weight: 400\">AI-powered attacks are evolving rapidly\u00a0 and so must your defense strategy. Predictive security, continuous monitoring, and intelligent automation are the keys to staying one step ahead.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Preparing now means investing in:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">AI-driven threat detection and<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/why-modern-businesses-in-bothell-and-renton-need-siem-tools-like-microsoft-sentinel\/\"> <span style=\"font-weight: 400\">security management<\/span><\/a><span style=\"font-weight: 400\"> tools.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reliable<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/data-backup-and-disaster-recovery-safeguarding-business-continuity-for-small-teams-and-startups-in-washington\/\"> <span style=\"font-weight: 400\">data recovery<\/span><\/a><span style=\"font-weight: 400\"> and backup strategies.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Comprehensive employee training programs.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong cloud and endpoint policies supported by expert oversight.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">When businesses combine advanced technology with human expertise, they don\u2019t just react to threats\u00a0 they predict and prevent them.<\/span><\/p>\n<h2><b>Conclusion<\/b><\/h2>\n<p><span style=\"font-weight: 400\">AI-powered cybercrime represents a turning point in digital security. Hackers are faster, smarter, and more unpredictable than ever. Yet, the same intelligence that powers these threats can also protect your business when deployed strategically.<\/span><\/p>\n<p><b>CMIT Solutions of Bothell and Renton<\/b><span style=\"font-weight: 400\"> helps companies harness AI responsibly\u00a0 using smart automation, secure cloud architecture, and advanced monitoring to build resilience from the inside out. Through continuous innovation,<\/span><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/blog\/cybersecurity-in-the-cloud-era-how-cmit-solutions-of-bothell-and-renton-protects-your-business-from-evolving-threats\/\"> <span style=\"font-weight: 400\">cloud security<\/span><\/a><span style=\"font-weight: 400\">, and intelligent management, your organization can stay ahead of cybercriminals and thrive in the AI era.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-full wp-image-978\" src=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1.png 1024w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1-300x75.png 300w, https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-content\/uploads\/sites\/105\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-6-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence has reshaped modern business operations, driving efficiency, automation, and smarter&#8230;<\/p>\n","protected":false},"author":1041,"featured_media":1857,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[33,32,62,47,21,16,18,20,17,35,25,30],"class_list":["post-1855","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-ai-and-compliance","tag-ai-in-business","tag-ai-powered-cybercrime","tag-ai-powered-it-strategy","tag-bothell-business-cybersecurity","tag-cmit-bothell","tag-cmit-bothell-and-renton","tag-cmit-bothell-cybersecurity","tag-cmit-renton","tag-digital-employee-experience","tag-ransomware-protection-bothell","tag-unified-tech-strategy-renton"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts\/1855","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/users\/1041"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/comments?post=1855"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/posts\/1855\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/media\/1857"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/media?parent=1855"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/categories?post=1855"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/bothell-wa-1091\/wp-json\/wp\/v2\/tags?post=1855"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}