{"id":1631,"date":"2026-01-28T05:08:58","date_gmt":"2026-01-28T11:08:58","guid":{"rendered":"https:\/\/cmitsolutions.com\/chicago-il-1223\/?p=1631"},"modified":"2026-01-28T05:08:58","modified_gmt":"2026-01-28T11:08:58","slug":"cybercriminals-are-targeting-midwestern-businesses-more-than-ever-heres-why","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cybercriminals-are-targeting-midwestern-businesses-more-than-ever-heres-why\/","title":{"rendered":"Cybercriminals Are Targeting Midwestern Businesses More Than Ever\u00a0 Here\u2019s Why"},"content":{"rendered":"<p>For years, cybercriminals focused their efforts on coastal tech hubs and large enterprises. That reality has changed. Today, Midwestern businesses are among the fastest-growing targets for cyberattacks, and the trend is accelerating.<\/p>\n<p>From manufacturing firms and professional service providers to healthcare, finance, and logistics companies, organizations across the Midwest are facing increased digital risk. The reason isn\u2019t geography alone\u2014it\u2019s a combination of economic growth, digital transformation, and long-standing misconceptions about who attackers target.<\/p>\n<p>Understanding <i>why<\/i> Midwestern businesses are being targeted is the first step toward protecting them.<\/p>\n<h2><b>The Midwest\u2019s Digital Transformation Has Accelerated<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Midwestern businesses have rapidly modernized over the past several years\u2014adopting cloud platforms, remote work models, automation, and connected systems to stay competitive.<\/span><\/p>\n<h3><b>Key shifts driving exposure include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cloud migration across legacy environments<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Hybrid and remote work adoption<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased reliance on third-party vendors<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integration of operational technology with IT systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Expansion of digital customer and partner portals<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">While these advancements drive growth, they also expand attack surfaces. As highlighted in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-future-of-it-must-have-technologies-for-growing-chicago-enterprises\/\"> <b>the future of IT<\/b><\/a><span style=\"font-weight: 400\">, rapid digital adoption without equal security investment creates opportunity for attackers.<\/span><\/p>\n<h2><b>A High Concentration of SMBs Makes the Region Attractive<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The Midwest is home to a dense population of small and mid-sized businesses (SMBs) a prime target segment for cybercriminals.<\/span><\/p>\n<h3><b>Why attackers prefer SMB-heavy regions:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited in-house cybersecurity expertise<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Fewer dedicated security tools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Slower detection and response times<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">High dependency on uptime<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Greater likelihood of paying ransoms<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This trend is explored in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/small-business-big-targets-why-hackers-dont-overlook-smbs\/\"> <b>small business big targets<\/b><\/a><span style=\"font-weight: 400\">, which explains why attackers see SMBs as efficient, profitable targets rather than \u201csmall fish.\u201d<\/span><\/p>\n<h2><b>Manufacturing and Supply Chain Exposure<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The Midwest\u2019s strong manufacturing and logistics presence has made it especially vulnerable to supply chain\u2013based attacks.<\/span><\/p>\n<h3><b>Industry-specific risks include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Connected industrial control systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Legacy operational technology<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Third-party vendor access<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Just-in-time production dependencies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited downtime tolerance<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">A single breach can ripple through suppliers, partners, and customers. CMIT addresses this interconnected risk in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-digital-supply-chain-protecting-vendors-partners-and-your-business\/\"> <b>digital supply chain<\/b><\/a><span style=\"font-weight: 400\">, emphasizing that attackers increasingly target shared dependencies rather than individual organizations.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1633\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/25-1024x535.png\" alt=\"\" width=\"1011\" height=\"528\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/25-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/25-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/25-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/25.png 1200w\" sizes=\"(max-width: 1011px) 100vw, 1011px\" \/><\/p>\n<h2><b>The \u201cWe\u2019re Not a Target\u201d Mindset<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the most dangerous vulnerabilities Midwestern businesses face isn\u2019t technical\u2014it\u2019s cultural.<\/span><\/p>\n<h3><b>Common assumptions attackers exploit:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u201cWe\u2019re too small to be targeted\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u201cWe don\u2019t store valuable data\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u201cCybercrime happens to big companies\u201d<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">\u201cWe\u2019ve never been attacked before\u201d<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This false sense of security delays investment and response. As detailed in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/silent-breaches-how-long-hackers-lurk-before-they-strike\/\"> <b>silent breaches<\/b><\/a><span style=\"font-weight: 400\">, many organizations are compromised long before they realize it often for months.<\/span><\/p>\n<h2><b>Ransomware Groups Are Shifting Strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Ransomware operations have become highly organized businesses. Instead of chasing massive enterprises with strong defenses, attackers now focus on regional firms with predictable operations.<\/span><\/p>\n<h3><b>Why Midwestern firms fit the profile:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Time-sensitive operations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Insurance coverage that may pay ransoms<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited incident response readiness<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Dependence on continuous availability<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The evolution of these tactics is outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cyber-resilience-2025-new-approaches-to-ransomware-prevention-and-recovery\/\"> <b>cyber resilience 2025<\/b><\/a><span style=\"font-weight: 400\">, where preparedness\u2014not just prevention is critical.<\/span><\/p>\n<h2><b>Increased Phishing and Social Engineering<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Midwestern businesses are seeing a surge in highly targeted phishing and impersonation attacks, often tailored using publicly available regional and organizational data.<\/span><\/p>\n<h3><b>Modern phishing tactics include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Emails impersonating local vendors or banks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Fake executive requests tied to regional travel or events<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Voice phishing using familiar accents and terminology<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">AI-generated messages that mirror internal communication styles<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These tactics are explored in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-evolution-of-phishing-from-fake-emails-to-voice-and-video-scams\/\"> <b>evolution of phishing<\/b><\/a><span style=\"font-weight: 400\">, showing how attackers exploit trust and familiarity.<\/span><\/p>\n<h2><b>Outdated Infrastructure Remains Widespread<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many Midwestern firms still rely on legacy systems that were never designed for today\u2019s threat environment.<\/span><\/p>\n<h3><b>Common infrastructure challenges include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unsupported operating systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Flat networks without segmentation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Manual patching processes<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited monitoring and logging<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Aging hardware tied to critical operations<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These issues contribute to the risk outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-hidden-operational-costs-of-outdated-tech-and-how-service-firms-can-break-the-cycle\/\"> <b>hidden operational costs<\/b><\/a><span style=\"font-weight: 400\">, where outdated tech quietly increases both cost and vulnerability.<\/span><\/p>\n<h2><b>Compliance Pressure Is Increasing<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As regulations tighten across industries finance, healthcare, manufacturing, and professional services noncompliance becomes both a legal and cybersecurity risk.<\/span><\/p>\n<h3><b>Compliance-related attack incentives include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Higher pressure to restore operations quickly<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Greater reputational damage from breaches<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased likelihood of settlements or fines<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sensitive data that increases extortion leverage<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">CMIT explores these risks in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/top-it-compliance-challenges-for-small-businesses-and-how-to-solve-them\/\"> <b>top IT compliance<\/b><\/a><span style=\"font-weight: 400\">, where weak controls often intersect with cyber incidents.<\/span><\/p>\n<h2><b>Hybrid Work Expanded the Attack Surface<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Remote and hybrid work models have permanently expanded access points into Midwestern businesses.<\/span><\/p>\n<h3><b>Hybrid risks include:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Home networks without enterprise security<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unmanaged or partially managed devices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cloud misconfigurations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent security enforcement<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The need for centralized control and visibility is reinforced in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-importance-of-endpoint-security-in-the-remote-work-era\/\"> <b>endpoint security<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Why Detection Matters More Than Geography<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Attackers don\u2019t choose targets based on location they choose based on <\/span>response capability.<\/p>\n<h3><b>Organizations most at risk:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack continuous monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rely on manual alerts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Have no incident response plan<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Detect breaches too late<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This reality underscores the importance of proactive defense models like those described in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-rise-of-xdr-why-extended-detection-and-response-is-the-future-of-cybersecurity\/\"> <b>rise of XDR<\/b><\/a><span style=\"font-weight: 400\">, which correlate activity across systems to stop attacks earlier.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-1634\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/26-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/26-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/26-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/26-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/01\/26.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Managed IT Services Close the Protection Gap<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most Midwestern SMBs cannot build enterprise-grade security internally. Managed IT Services provide access to advanced tools, expertise, and continuous oversight.<\/span><\/p>\n<h3><b>Managed services help by:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Monitoring systems 24\/7<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automating threat detection and response<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Securing cloud and endpoints<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Managing compliance requirements<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Supporting rapid recovery<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This proactive approach is detailed in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-managed-it-services-are-the-backbone-of-modern-business-efficiency\/\"> <b>why managed IT services<\/b><\/a><span style=\"font-weight: 400\">, where prevention replaces firefighting.<\/span><\/p>\n<h2><b>Local Expertise Makes a Measurable Difference<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Local IT partners understand regional industries, business rhythms, and regulatory environments allowing for faster, more effective response.<\/span><\/p>\n<h3><b>Advantages of local partnership:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Faster onsite support<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Familiarity with regional vendors<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Tailored security strategies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Long-term accountability<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">As shown in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-businesses-in-chicago-west-are-choosing-local-msps-over-big-box-it\/\"> <b>why businesses in <\/b><\/a><span style=\"font-weight: 400\">Western Suburbs<\/span><span style=\"font-weight: 400\">, proximity and expertise reduce both risk and downtime.<\/span><\/p>\n<h2><b>How Midwestern Businesses Can Respond Now<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The rise in attacks is real but it\u2019s manageable with the right strategy.<\/span><\/p>\n<h3><b>Immediate actions businesses should take:<\/b><\/h3>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Assess current security posture<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Modernize outdated systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implement continuous monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Train employees regularly<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Test backup and recovery plans<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These steps align with the roadmap outlined in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cyber-resilience-over-cybersecurity-why-smbs-need-both\/\"> <b>cyber resilience over cybersecurity<\/b><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Conclusion: The Midwest Is on the Cyber Front Line<\/b><\/h2>\n<p>Cybercriminals are targeting Midwestern businesses not because they\u2019re behind but because they\u2019re growing, connected, and essential to national supply chains.<\/p>\n<p>The good news? Businesses that recognize this shift early can stay ahead.<\/p>\n<p>By partnering with CMIT Solutions Western Suburbs, organizations gain the visibility, protection, and expertise needed to defend against modern threats turning regional growth into a strength, not a vulnerability.<\/p>\n<p>Cybersecurity today isn\u2019t about location.<br \/>\nIt\u2019s about readiness.<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter  wp-image-648\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png\" alt=\"\" width=\"1012\" height=\"253\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-300x75.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-768x192.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2.png 1200w\" sizes=\"(max-width: 1012px) 100vw, 1012px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For years, cybercriminals focused their efforts on coastal tech hubs and large&#8230;<\/p>\n","protected":false},"author":1024,"featured_media":1632,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,39,43,29,20,16,23,26,22,31,24,35,47,46,25,27,34],"class_list":["post-1631","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-monitoring","tag-ai-powered-apps-chicago","tag-cloud-compliance","tag-cloud-infrastructure-chicago","tag-cloud-services","tag-cybersecurity","tag-data-backup","tag-data-protection-and-recovery","tag-disaster-recovery","tag-it-compliance","tag-it-guidance","tag-it-infrastructure","tag-it-support-chicagowest","tag-managed-it-support-chocagowest","tag-managed-services-chicago","tag-network-management","tag-tech-support-chicago"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1631","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/users\/1024"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/comments?post=1631"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1631\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media\/1632"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media?parent=1631"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/categories?post=1631"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/tags?post=1631"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}