{"id":1262,"date":"2025-10-03T03:00:35","date_gmt":"2025-10-03T08:00:35","guid":{"rendered":"https:\/\/cmitsolutions.com\/chicago-il-1223\/?p=1262"},"modified":"2025-10-28T03:24:02","modified_gmt":"2025-10-28T08:24:02","slug":"cyber-resilience-over-cybersecurity-why-smbs-need-both","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cyber-resilience-over-cybersecurity-why-smbs-need-both\/","title":{"rendered":"Cyber Resilience Over Cybersecurity: Why SMBs Need Both"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Small and midsize businesses (SMBs) face a new reality: cybersecurity alone is no longer enough. While firewalls, antivirus, and email filters are vital defenses, the growing complexity of attacks has shown that businesses also need <\/span><b>cyber resilience<\/b><span style=\"font-weight: 400\"> the ability to bounce back quickly after an incident. For SMBs in Chicago West and beyond, the difference between security and resilience could mean survival.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In this article, we\u2019ll break down what cyber resilience really means, why it complements traditional cybersecurity, and how managed IT services help SMBs prepare for an unpredictable future.<\/span><\/p>\n<h2><b>What Is Cybersecurity and Why Is It Limited?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cybersecurity refers to the tools, technologies, and strategies used to <\/span><b>prevent unauthorized access<\/b><span style=\"font-weight: 400\"> to systems, networks, and data. It\u2019s about building strong walls around your digital assets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Most SMBs start here\u2014investing in antivirus, firewalls, secure email gateways, and endpoint detection. These tools are essential, but attackers are getting smarter. Phishing campaigns and ransomware-as-a-service can slip past defenses, leaving SMBs exposed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Take, for example, <\/span><b>advanced social engineering attacks<\/b><span style=\"font-weight: 400\"> that target employees. Even if you deploy the strongest technical defenses, a single click can open the door. That\u2019s where resilience comes in. Businesses already exploring<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/beyond-the-cloud-emerging-it-infrastructure-innovations-for-2025\/\"> <span style=\"font-weight: 400\">emerging IT infrastructure innovations<\/span><\/a><span style=\"font-weight: 400\"> know how vital adaptability is in this space.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For SMBs in regulated industries like healthcare, building a strategy around <\/span><b>HIPAA-compliant IT solutions<\/b><span style=\"font-weight: 400\"> is no longer optional <\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/securing-sensitive-data-in-healthcare-a-guide-to-hipaa-compliant-it-solutions\/\"><span style=\"font-weight: 400\">securing sensitive healthcare data<\/span><\/a><span style=\"font-weight: 400\"> demonstrates how compliance and security must work together.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-1265\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-61-1024x535.png\" alt=\"\" width=\"840\" height=\"439\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-61-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-61-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-61-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-61.png 1200w\" sizes=\"(max-width: 840px) 100vw, 840px\" \/><\/p>\n<h2><b>What Is Cyber Resilience?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyber resilience goes beyond prevention. It\u2019s about preparing for the reality that <\/span><b>some attacks will succeed<\/b><span style=\"font-weight: 400\">. A resilient business focuses on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Recovery:<\/b><span style=\"font-weight: 400\"> How fast can you restore critical operations?<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Continuity:<\/b><span style=\"font-weight: 400\"> Can your team keep working if systems are disrupted?<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Adaptability:<\/b><span style=\"font-weight: 400\"> Are you learning from every incident to get stronger?<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This shift in mindset is essential. In fact, a recent study showed that <\/span><b>60% of SMBs close within six months of a cyberattack<\/b><span style=\"font-weight: 400\"> if they cannot recover quickly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When combined with cybersecurity, resilience provides a <\/span><b>holistic defense model<\/b><span style=\"font-weight: 400\">. Instead of only trying to keep attackers out, businesses ensure they can <\/span><b>withstand and recover<\/b><span style=\"font-weight: 400\"> when defenses are breached. This is evident in the<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cyber-resilience-2025-new-approaches-to-ransomware-prevention-and-recovery\/\"> <span style=\"font-weight: 400\">cyber resilience strategies for ransomware prevention<\/span><\/a><span style=\"font-weight: 400\"> shaping the future.<\/span><\/p>\n<h2><b>Why SMBs Need Both Cybersecurity and Cyber Resilience<\/b><\/h2>\n<h3><b>SMBs Are Prime Targets<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Attackers know SMBs often lack enterprise-level defenses. Cybercriminals exploit this gap. The<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cybersecurity-forecast-2025-threats-trends-and-the-msp-response\/\"> <span style=\"font-weight: 400\">cybersecurity forecast for 2025<\/span><\/a><span style=\"font-weight: 400\"> highlights how ransomware, phishing, and insider threats are rising, especially in small businesses.<\/span><\/p>\n<h3><b>Downtime Costs More Than Data Loss<\/b><\/h3>\n<p><span style=\"font-weight: 400\">For SMBs, downtime can cripple operations. Even a few hours offline can result in <\/span><b>lost revenue, missed client opportunities, and reputational damage<\/b><span style=\"font-weight: 400\">. That\u2019s why resilience\u2014quick recovery, business continuity planning, and cloud backup is so critical. Many organizations are learning from<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cloud-native-vs-cloud-enabled-choosing-the-right-infrastructure-for-long-term-growth\/\"> <span style=\"font-weight: 400\">cloud-native infrastructure strategies<\/span><\/a><span style=\"font-weight: 400\"> to ensure continuity.<\/span><\/p>\n<h3><b>Compliance and Reputation<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Cyber resilience isn\u2019t just about bouncing back. Regulators, partners, and customers expect businesses to protect and restore data. A failure to recover quickly can <\/span><b>erode trust permanently<\/b><span style=\"font-weight: 400\">. The<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/top-it-compliance-challenges-for-small-businesses-and-how-to-solve-them\/\"> <span style=\"font-weight: 400\">top IT compliance challenges for small businesses<\/span><\/a><span style=\"font-weight: 400\"> reinforce why resilience and compliance go hand in hand.<\/span><\/p>\n<h3><b>The Hybrid Workplace Demands It<\/b><\/h3>\n<p><span style=\"font-weight: 400\">With remote and hybrid workforces, employees use more tools than ever. Businesses leveraging<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/ucaas-security-in-2025-protecting-calls-chats-and-virtual-meetings\/\"> <span style=\"font-weight: 400\">UCaaS security<\/span><\/a><span style=\"font-weight: 400\"> solutions need resilience baked in to protect not just files but also calls, chats, and meetings.<\/span><\/p>\n<p><a href=\"https:\/\/youtu.be\/ARlRJJoBsBY\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-1267\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-video-template-10-1024x576.png\" alt=\"\" width=\"1024\" height=\"576\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-video-template-10-1024x576.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-video-template-10-300x169.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-video-template-10-768x432.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-video-template-10.png 1280w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<h2><b>Why SMBs Need Managed IT Services<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyber resilience requires planning, monitoring, and proactive response tasks that can overwhelm SMBs with small IT teams. That\u2019s where <\/span><b>managed IT services<\/b><span style=\"font-weight: 400\"> come in.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Managed Service Providers (MSPs) like CMIT Solutions deliver:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>24\/7 monitoring<\/b><span style=\"font-weight: 400\"> to catch issues early.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Cloud backup and recovery<\/b><span style=\"font-weight: 400\"> so data is never lost.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Compliance expertise<\/b><span style=\"font-weight: 400\"> for industries under strict regulations.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Security awareness training<\/b><span style=\"font-weight: 400\"> to strengthen the human firewall.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Strategic guidance<\/b><span style=\"font-weight: 400\"> to balance budgets and long-term IT goals.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">For many SMBs, MSPs offer the <\/span><b>backbone of modern business efficiency<\/b><span style=\"font-weight: 400\">, similar to what\u2019s discussed in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-managed-it-services-are-the-backbone-of-modern-business-efficiency\/\"> <span style=\"font-weight: 400\">why managed IT services are essential<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>What Happens If SMBs Ignore Cyber Resilience?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Imagine this scenario: your business relies only on traditional cybersecurity. You have antivirus, a firewall, and secure passwords. Then, one day, a phishing email slips through and deploys ransomware. Suddenly:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer records are locked.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employees cannot log in.<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operations grind to a halt.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Without resilience\u2014cloud backups, an incident response plan, and recovery strategies your business could be offline for <\/span><b>days or weeks<\/b><span style=\"font-weight: 400\">. Digital-first businesses that adopt<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/from-clicks-to-code-why-low-code-platforms-are-revolutionizing-smb-productivity\/\"> <span style=\"font-weight: 400\">low-code platforms for productivity<\/span><\/a><span style=\"font-weight: 400\"> and resilient cloud strategies recover faster than those with outdated setups.<\/span><\/p>\n<h2><b>Building a Cyber Resilient SMB<\/b><\/h2>\n<h3><b>Proactive Monitoring<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Don\u2019t wait for alerts after damage is done. Proactive monitoring part of<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/from-it-chaos-to-strategy-2025-digital-transformation-playbook-for-smbs\/\"> <span style=\"font-weight: 400\">digital transformation roadmaps<\/span><\/a><span style=\"font-weight: 400\"> identifies weaknesses before they become breaches.<\/span><\/p>\n<h3><b>Backup and Disaster Recovery<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Regular, encrypted backups are critical. Cloud storage solutions that scale like those explored in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cloud-services-that-scale-unlocking-business-agility-for-chicago-west-smes\/\"> <span style=\"font-weight: 400\">scalable cloud services<\/span><\/a><span style=\"font-weight: 400\"> ensure that recovery is fast and reliable.<\/span><\/p>\n<h3><b>Employee Awareness<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Phishing and social engineering are the top causes of breaches. Security awareness training builds resilience at the <\/span><b>human layer<\/b><span style=\"font-weight: 400\">. Organizations exploring<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/boosting-productivity-with-ai-the-new-role-of-intelligent-apps-in-the-workplace\/\"> <span style=\"font-weight: 400\">AI-powered workplace apps<\/span><\/a><span style=\"font-weight: 400\"> often pair them with awareness programs to reduce risk.<\/span><\/p>\n<h3><b>Incident Response Planning<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Your team should know exactly what to do during an attack. A clear plan reduces panic and accelerates recovery. Businesses adopting<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-rise-of-xdr-why-extended-detection-and-response-is-the-future-of-cybersecurity\/\"> <span style=\"font-weight: 400\">extended detection and response<\/span><\/a><span style=\"font-weight: 400\"> find incident response smoother and faster.<\/span><\/p>\n<h3><b>Future-Proofing IT<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Emerging tech like <\/span><b>edge computing<\/b><span style=\"font-weight: 400\"> adds complexity to IT environments. A cyber-resilient SMB doesn\u2019t just adopt new tools\u2014it ensures they\u2019re secure and backed by recovery measures. Companies exploring<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/edge-computing-explained-the-new-frontier-for-real-time-business-intelligence\/\"> <span style=\"font-weight: 400\">real-time business intelligence with edge computing<\/span><\/a><span style=\"font-weight: 400\"> know resilience must grow alongside innovation.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-1266\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-62-1024x535.png\" alt=\"\" width=\"852\" height=\"445\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-62-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-62-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-62-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/10\/Copy-of-cmit-boise-featured-image-62.png 1200w\" sizes=\"(max-width: 852px) 100vw, 852px\" \/><\/p>\n<h2><b>Cyber Resilience in Practice: Chicago SMBs Leading the Way<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In Chicago West, SMBs across industries\u2014from construction to healthcare are already integrating resilience strategies. For example:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>Construction firms<\/b><span style=\"font-weight: 400\"> are adopting<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/building-smarter-with-technology-it-services-that-power-construction-projects\/\"> <span style=\"font-weight: 400\">IT services for construction projects<\/span><\/a><span style=\"font-weight: 400\"> to keep workflows moving, even when networks face downtime.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Healthcare organizations<\/b><span style=\"font-weight: 400\"> are combining compliance and resilience through HIPAA-ready solutions.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Professional services firms<\/b><span style=\"font-weight: 400\"> are reducing costs by aligning resilience with<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/smart-it-spending-in-chicago-west-how-device-as-a-service-daas-is-reshaping-business-technology\/\"> <span style=\"font-weight: 400\">device-as-a-service solutions<\/span><\/a><span style=\"font-weight: 400\"> that streamline operations.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These businesses understand that resilience is not a \u201cnice to have\u201d but a <\/span><b>business necessity<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Looking Ahead: The Future of Cyber Resilience<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The IT landscape in 2025 and beyond is changing fast:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><b>AI-powered cyberattacks<\/b><span style=\"font-weight: 400\"> will evolve faster than traditional defenses.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>XDR (Extended Detection and Response)<\/b><span style=\"font-weight: 400\"> solutions will become central to resilience strategies.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Quantum computing<\/b><span style=\"font-weight: 400\"> will disrupt encryption, creating both risks and opportunities\u2014see<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/how-quantum-computing-could-transform-data-security-for-chicagos-small-businesses\/\"> <span style=\"font-weight: 400\">quantum computing for small business security<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Sustainable IT<\/b><span style=\"font-weight: 400\"> will align resilience with cost savings, making solutions like<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/sustainability-meets-tech-green-it-strategies-for-cost-efficient-business-growth\/\"> <span style=\"font-weight: 400\">green IT strategies<\/span><\/a><span style=\"font-weight: 400\"> critical for long-term growth.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Resilience will no longer be optional it will be the <\/span><b>default mode of IT strategy<\/b><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Conclusion: Cyber Resilience Over Cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For SMBs, cybersecurity is the first line of defense, but resilience is what ensures long-term survival. Relying only on preventative tools leaves businesses vulnerable to downtime, reputational loss, and regulatory penalties. A layered approach\u2014blending proactive security with backup, recovery, and adaptability creates the strongest shield.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-648\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-300x75.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-768x192.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Small and midsize businesses (SMBs) face a new reality: cybersecurity alone is&#8230;<\/p>\n","protected":false},"author":1024,"featured_media":1264,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,39,43,29,20,17,21,23,25,38,34],"class_list":["post-1262","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-monitoring","tag-ai-powered-apps-chicago","tag-cloud-compliance","tag-cloud-infrastructure-chicago","tag-cloud-services","tag-cmit-chicagowest","tag-compliance","tag-data-backup","tag-managed-services-chicago","tag-scaling-with-ai","tag-tech-support-chicago"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1262","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/users\/1024"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/comments?post=1262"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1262\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media\/1264"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media?parent=1262"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/categories?post=1262"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/tags?post=1262"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}