{"id":1619,"date":"2026-01-28T04:34:20","date_gmt":"2026-01-28T10:34:20","guid":{"rendered":"https:\/\/cmitsolutions.com\/chicago-il-1223\/?p=1619"},"modified":"2026-01-28T04:34:20","modified_gmt":"2026-01-28T10:34:20","slug":"ai-powered-threats-are-becoming-autonomous-what-businesses-must-prepare-for-next","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/ai-powered-threats-are-becoming-autonomous-what-businesses-must-prepare-for-next\/","title":{"rendered":"AI-Powered Threats Are Becoming Autonomous: What Businesses Must Prepare For Next"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Artificial intelligence has transformed how businesses operate but it has also transformed how cybercriminals attack. What once required manual effort and human oversight is now increasingly autonomous, self-learning, and adaptive.<\/span><\/p>\n<p><span style=\"font-weight: 400\">AI-powered threats can scan networks, modify attack paths, impersonate real people, and evade traditional defenses without direct human control. For small and mid-sized businesses, this shift represents a critical inflection point. Cybersecurity strategies designed for yesterday\u2019s threats are no longer sufficient.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To stay protected, businesses must understand what autonomous cyber threats look like, how they operate, and what preparations are necessary to defend against them.<\/span><\/p>\n<h2><b>What Makes AI-Powered Threats \u201cAutonomous\u201d<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Traditional cyberattacks depend on scripted actions or manual oversight. Autonomous threats, by contrast, use machine learning to make decisions in real time adjusting tactics as they encounter resistance.<\/span><\/p>\n<h3><b>Key characteristics of autonomous threats:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Self-learning behavior based on environmental feedback<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time decision making without human input<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ability to change attack vectors dynamically<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous testing of defenses for weaknesses<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Persistence across systems and sessions<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These threats do not follow a fixed playbook. As outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cybersecurity-forecast-2025-threats-trends-and-the-msp-response\/\"> <b>cybersecurity forecast 2025<\/b><\/a><span style=\"font-weight: 400\">, attackers increasingly rely on automation to scale attacks faster than traditional security teams can respond.<\/span><\/p>\n<h2><b>From Automated Attacks to Autonomous Campaigns<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The evolution from automation to autonomy is subtle but dangerous. Automation executes instructions. Autonomy decides <\/span><i><span style=\"font-weight: 400\">what to do next<\/span><\/i><span style=\"font-weight: 400\">.<\/span><\/p>\n<h3><b>How attack evolution has progressed:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Manual phishing \u2192 automated phishing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Scripted malware \u2192 adaptive malware<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Static ransomware \u2192 self-propagating ransomware<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Human reconnaissance \u2192 AI-driven network mapping<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This progression mirrors the same AI efficiencies businesses use to optimize operations. As described in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/boosting-productivity-with-ai-the-new-role-of-intelligent-apps-in-the-workplace\/\"> <b>boosting productivity<\/b><\/a><span style=\"font-weight: 400\">, intelligence systems amplify speed and scale whether used defensively or maliciously.<\/span><\/p>\n<h2><b>Autonomous Phishing and Social Engineering<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the most immediate threats facing businesses is autonomous social engineering. AI systems can now generate, test, refine, and redeploy phishing messages automatically.<\/span><\/p>\n<h3><b>Autonomous phishing capabilities include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time personalization using scraped data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adaptive language that mirrors internal communication styles<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous testing of subject lines and payloads<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Escalation to voice or video impersonation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Targeting based on employee behavior patterns<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These tactics are discussed in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-evolution-of-phishing-from-fake-emails-to-voice-and-video-scams\/\"> <b>the evolution of phishing<\/b><\/a><span style=\"font-weight: 400\">, highlighting why traditional awareness training alone is no longer enough.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-1621\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/28-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/28-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/28-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/28-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/28.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Self-Directed Ransomware and Lateral Movement<\/b><\/h2>\n<p>Autonomous ransomware doesn\u2019t just encrypt files it decides where to go next<span style=\"font-weight: 400\">. Using AI-driven logic, modern ransomware can identify high-value systems, backup repositories, and administrative accounts.<\/span><\/p>\n<h3><b>Capabilities of autonomous ransomware:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Intelligent lateral movement across networks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Prioritization of mission-critical systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Detection and disabling of backups<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Timing attacks for maximum disruption<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Self-modifying payloads to evade detection<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This shift reinforces why resilience matters as much as prevention, a key principle explained in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cyber-resilience-2025-new-approaches-to-ransomware-prevention-and-recovery\/\"> <b>cyber resilience 2025<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Why SMBs Are Prime Targets<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Autonomous threats don\u2019t discriminate by company size they discriminate by opportunity. SMBs often lack continuous monitoring, layered defenses, and rapid response capabilities.<\/span><\/p>\n<h3><b>Why autonomous threats target SMBs:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Less mature security tooling<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited in-house expertise<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Slower detection times<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">High dependency on availability<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Greater likelihood of paying ransoms<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As emphasized in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/small-business-big-targets-why-hackers-dont-overlook-smbs\/\"> <b>small business big targets<\/b><\/a><span style=\"font-weight: 400\">, attackers know that SMBs are often the fastest path to financial gain.<\/span><\/p>\n<h2><b>Autonomous Threats vs. Legacy Security Tools<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Legacy security tools rely heavily on known signatures, predefined rules, and manual intervention. Autonomous threats exploit these limitations.<\/span><\/p>\n<h3><b>Why traditional defenses fail:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Signature-based detection misses novel attacks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Static rules can\u2019t adapt in real time<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Alerts overwhelm small security teams<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delayed response allows rapid spread<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Modern defense models like those described in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-rise-of-xdr-why-extended-detection-and-response-is-the-future-of-cybersecurity\/\"> <b>the rise of XDR<\/b><\/a><span style=\"font-weight: 400\"> focus on behavior, correlation, and automated response critical when threats move faster than humans can react.<\/span><\/p>\n<h2><b>AI vs. AI: The New Cybersecurity Reality<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The future of cybersecurity is no longer human vs. hacker it\u2019s <\/span>AI vs. AI, with human oversight guiding strategy and ethics.<\/p>\n<h3><b>Defensive AI capabilities include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Behavioral anomaly detection<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated containment of compromised devices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Correlation across endpoints, email, and cloud<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Predictive threat modeling<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time response orchestration<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This approach aligns with the broader shift outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-future-of-it-must-have-technologies-for-growing-chicago-enterprises\/\"> <b>the future of IT<\/b><\/a><span style=\"font-weight: 400\">, where intelligent systems augment not replace human expertise.<\/span><\/p>\n<h2><b>Autonomous Attacks and Hybrid Work Environments<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Distributed work environments expand attack surfaces and provide autonomous threats with more opportunities to probe for weakness.<\/span><\/p>\n<h3><b>Hybrid vulnerabilities include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unmanaged endpoints<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent patching<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal networks and devices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cloud misconfigurations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Fragmented visibility<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As discussed in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-importance-of-endpoint-security-in-the-remote-work-era\/\"> <b>endpoint security<\/b><\/a><span style=\"font-weight: 400\">, continuous monitoring and centralized control are essential when threats can adapt faster than manual processes.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/29-1024x535.png\" \/><\/p>\n<h2><b>Data Exfiltration Without Detection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Autonomous threats don\u2019t always announce themselves. Some quietly observe, collect, and exfiltrate data over time using AI to avoid triggering alerts.<\/span><\/p>\n<h3><b>Stealth techniques include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Low-and-slow data transfers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Encryption blending with legitimate traffic<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Timing exfiltration during peak usage<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Using cloud services as staging points<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This reinforces the importance of layered visibility and analytics, concepts central to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-digital-trust-factor-building-customer-confidence-through-strong-it-practices\/\"> <b>digital trust factor<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>What Businesses Must Prepare For Now<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Autonomous threats are not theoretical they are active today. Preparation requires both technology and mindset shifts.<\/span><\/p>\n<h3><b>Critical preparation steps:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adopt behavior-based detection tools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implement Zero Trust access controls<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automate patching and response workflows<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitor continuously across environments<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Test recovery and response plans regularly<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These steps reflect best practices outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-managed-it-services-are-the-backbone-of-modern-business-efficiency\/\"> <b>why managed IT services<\/b><\/a><span style=\"font-weight: 400\">, where proactive management replaces reactive firefighting.<\/span><\/p>\n<h2><b>The Role of Managed Security Partners<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most SMBs cannot realistically build autonomous defense systems alone. Managed security partnerships provide access to advanced tools, threat intelligence, and round-the-clock response.<\/span><\/p>\n<h3><b>Benefits of managed security include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">24\/7 threat detection and response<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">AI-driven monitoring platforms<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated incident containment<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compliance and audit support<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strategic risk assessments<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As explained in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-businesses-in-chicago-west-are-choosing-local-msps-over-big-box-it\/\"><span style=\"font-weight: 400\"> why businesses in Western Suburbs<\/span><\/a><span style=\"font-weight: 400\">, local MSPs deliver faster response and accountability when seconds matter.<\/span><\/p>\n<h2><b>Preparing Teams for an Autonomous Threat Era<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology alone cannot stop autonomous threats. Employees remain both a target and a defense layer.<\/span><\/p>\n<h3><b>Human preparedness includes:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Advanced phishing simulations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear incident reporting procedures<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing security awareness education<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Role-based access training<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Autonomous threats exploit confusion and delay. Training reduces decision-making time and limits damage when attacks bypass technical controls.<\/span><\/p>\n<h2><b>From Cybersecurity to Cyber Resilience<\/b><\/h2>\n<p>The goal is no longer perfect prevention it\u2019s survivability. Autonomous threats ensure that some attacks will get through.<\/p>\n<h3><b>Resilience-focused strategies include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Immutable backups<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rapid system restoration<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Segmented networks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated recovery testing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Business continuity planning<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These principles are core to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/beyond-backups-the-rise-of-real-time-data-recovery-solutions\/\"> <b>beyond backups<\/b><\/a><span style=\"font-weight: 400\">, where recovery speed becomes a competitive advantage.<\/span><\/p>\n<h2><b>What the Next Phase Will Look Like<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As AI continues to evolve, autonomous threats will become more coordinated, stealthy, and persistent.<\/span><\/p>\n<h3><b>Expected developments include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-stage autonomous campaigns<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cross-organization attack learning<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">AI-driven credential harvesting<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Fully automated attack lifecycle management<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Businesses that wait to react will fall behind. Those that prepare now will gain resilience, confidence, and trust.<\/span><\/p>\n<h2><b>Conclusion: Autonomous Threats Demand Autonomous Defense<\/b><\/h2>\n<p>AI-powered threats are no longer just faster they\u2019re self-directed. Businesses that rely on manual processes, legacy tools, or reactive security will struggle to keep pace.<\/p>\n<p>By investing in intelligent defenses, proactive monitoring, and trusted partnerships like CMIT Solutions Western Suburbs, organizations can meet autonomy with autonomy combining AI-driven protection with human oversight and strategic control.<\/p>\n<p>The future of cybersecurity belongs to those who prepare today for threats that think for themselves.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-648\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-300x75.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-768x192.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Artificial intelligence has transformed how businesses operate but it has also transformed&#8230;<\/p>\n","protected":false},"author":1024,"featured_media":1620,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,39,43,29,20,23,26,22,31,24,35,47,25,27,34],"class_list":["post-1619","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-monitoring","tag-ai-powered-apps-chicago","tag-cloud-compliance","tag-cloud-infrastructure-chicago","tag-cloud-services","tag-data-backup","tag-data-protection-and-recovery","tag-disaster-recovery","tag-it-compliance","tag-it-guidance","tag-it-infrastructure","tag-it-support-chicagowest","tag-managed-services-chicago","tag-network-management","tag-tech-support-chicago"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1619","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/users\/1024"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/comments?post=1619"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1619\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media\/1620"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media?parent=1619"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/categories?post=1619"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/tags?post=1619"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}