{"id":1667,"date":"2026-02-04T01:10:24","date_gmt":"2026-02-04T07:10:24","guid":{"rendered":"https:\/\/cmitsolutions.com\/chicago-il-1223\/?p=1667"},"modified":"2026-02-04T01:10:24","modified_gmt":"2026-02-04T07:10:24","slug":"what-smb-leaders-need-to-know-about-todays-digital-risk-landscape","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/what-smb-leaders-need-to-know-about-todays-digital-risk-landscape\/","title":{"rendered":"What SMB Leaders Need to Know About Today\u2019s Digital Risk Landscape"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Digital risk is no longer a concern reserved for large enterprises with complex infrastructures and global operations. Small and mid-sized businesses now face many of the same threats often with fewer resources to respond. As technology becomes more deeply woven into daily operations, the potential impact of digital risk grows significantly. Cyber incidents, system failures, compliance gaps, and operational disruptions can stall growth, damage trust, and strain financial stability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Western Suburbs, we work closely with SMB leaders who are navigating this increasingly complex risk environment. Understanding today\u2019s digital risk landscape is the first step toward building a resilient, secure, and future-ready organization. This blog outlines the most critical areas SMB leaders must focus on to protect their businesses and make informed technology decisions.<\/span><\/p>\n<h2><b>Digital Risk Is No Longer Just an IT Problem<\/b><\/h2>\n<p><span style=\"font-weight: 400\">For many years, digital risk was viewed as a technical issue that belonged solely to the IT department. Today, that perspective no longer holds true. Digital risk affects every aspect of a business, from operations and finance to customer relationships and brand reputation. When systems fail or data is compromised, the consequences extend far beyond technology.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMB leaders must recognize that digital risk is a business risk. Decisions about technology investments, workflows, and security policies directly influence an organization\u2019s ability to operate reliably and compete effectively. Leadership involvement is essential to managing risk holistically rather than reacting to isolated incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To understand why digital risk must be addressed at the leadership level, consider the broader impacts it creates across the organization:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operational disruptions that halt productivity<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Financial losses from downtime and recovery efforts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reputational damage that erodes customer trust connected to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-digital-trust-factor-building-customer-confidence-through-strong-it-practices\/\"> <span style=\"font-weight: 400\">digital trust<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Legal and regulatory exposure tied to compliance standards<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strategic setbacks that slow growth initiatives<\/span><\/li>\n<\/ul>\n<h2><b>The Expanding Attack Surface in Modern SMBs<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As businesses adopt cloud platforms, remote work tools, mobile devices, and third-party applications, their digital footprint expands. Each new system or access point introduces potential vulnerabilities that can be exploited if not properly secured. This expanding attack surface increases both the likelihood and complexity of digital risks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMBs often adopt new technologies quickly to stay competitive, but without a cohesive strategy, this growth can outpace security and governance efforts. Over time, disconnected systems and unmanaged access points create blind spots that increase exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A growing digital environment introduces risk through multiple channels, including:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Remote and hybrid work access points supported by hybrid workforce tools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Cloud-based applications and storage requiring<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cloud-security-essentials-protecting-your-data-in-the-digital-age\/\"> <span style=\"font-weight: 400\">cloud security<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal and unmanaged devices that benefit from mobile device management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Third-party vendors and integrations linked to the<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-digital-supply-chain-protecting-vendors-partners-and-your-business\/\"> <span style=\"font-weight: 400\">digital supply chain<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Legacy systems that no longer receive updates and may require infrastructure upgrades<\/span><\/li>\n<\/ul>\n<h2><b>Cyber Threats Are Becoming More Sophisticated and Persistent<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyber threats targeting SMBs have evolved significantly. Attackers no longer rely solely on simple tactics; instead, they use layered approaches that combine phishing, credential theft, malware, and social engineering. These threats are designed to bypass basic defenses and exploit human behavior as much as technical weaknesses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMBs are often targeted precisely because they may lack advanced security controls or dedicated monitoring. Without a proactive approach, businesses may not detect threats until damage has already occurred.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Understanding the nature of modern cyber threats helps SMB leaders prioritize protection efforts in key areas:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Email-based attacks targeting employees driven by the<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-evolution-of-phishing-from-fake-emails-to-voice-and-video-scams\/\"> <span style=\"font-weight: 400\">evolution of phishing<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Credential compromise through reused or weak passwords<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Malware designed to evade basic detection<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lateral movement within networks after initial access<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delayed detection that increases overall impact described in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cybersecurity-forecast-2025-threats-trends-and-the-msp-response\/\"> <span style=\"font-weight: 400\">cybersecurity trends<\/span><\/a><\/li>\n<\/ul>\n<h2><b>The Hidden Risks of Outdated Systems and Processes<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Outdated hardware, unsupported software, and manual processes introduce significant digital risk. Systems that are no longer updated with security patches become easy targets for attackers, while inefficient processes increase the likelihood of human error. Over time, these weaknesses compound and create systemic risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Many SMBs delay upgrades due to cost concerns or fear of disruption. However, postponing modernization often leads to greater expense and risk in the long run.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Outdated technology environments increase risk by contributing to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Known vulnerabilities that attackers actively exploit highlighted in<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/patch-or-perish-why-outdated-software-is-the-1-entry-point-for-hackers\/\"> <span style=\"font-weight: 400\">patch risks<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compatibility issues with modern applications<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased downtime and system failures that proactive teams reduce with<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/how-proactive-it-monitoring-prevents-downtime-and-data-loss\/\"> <span style=\"font-weight: 400\">monitoring<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced employee productivity<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited ability to scale or adapt without<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cloud-services-that-scale-unlocking-business-agility-for-chicago-west-smes\/\"> <span style=\"font-weight: 400\">cloud services<\/span><\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-1668\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/7-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/7-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/7-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/7-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/7.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Human Error Remains a Major Risk Factor<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Despite advances in technology, people remain one of the most significant sources of digital risk. Employees are frequently targeted through phishing emails, social engineering attempts, and fraudulent requests that appear legitimate. Without proper awareness and safeguards, even well-meaning staff can unintentionally expose the organization to harm.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMB leaders must understand that digital risk management includes people, not just systems. Policies, training, and access controls all play a role in reducing the likelihood and impact of human error.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Human-related digital risks commonly stem from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of cybersecurity awareness and training supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/is-your-business-ready-for-the-next-cyberattack-what-to-do-now\/\"> <span style=\"font-weight: 400\">risk readiness<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Overly broad system access permissions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent enforcement of security policies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Poor password and authentication practices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inadequate verification of sensitive requests<\/span><\/li>\n<\/ul>\n<h2><b>Compliance and Regulatory Risk Is Increasing<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Regulatory requirements affecting data protection, privacy, and operational controls continue to expand across industries. Even SMBs that are not directly regulated may still be subject to contractual obligations or customer expectations related to data security and compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Failure to meet compliance requirements can result in financial penalties, legal exposure, and reputational damage. More importantly, compliance gaps often indicate broader weaknesses in risk management and governance.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMB leaders should be aware of how compliance risk manifests within their technology environment:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent data handling and retention practices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of documentation and audit readiness<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Insufficient access controls and monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Poor visibility into third-party risk<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reactive responses to compliance requirements tied to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/top-it-compliance-challenges-for-small-businesses-and-how-to-solve-them\/\"> <span style=\"font-weight: 400\">compliance challenges<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Business Continuity Is Closely Tied to Digital Risk<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Digital disruptions whether caused by cyber incidents, system failures, or human error\u2014can quickly escalate into full-scale business interruptions. Without proper planning, recovery efforts may take longer than expected, increasing financial and operational impact.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Business continuity planning is a critical component of digital risk management. It ensures that essential systems and data can be restored efficiently and that employees know how to respond during disruptions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Strong continuity planning reduces digital risk by addressing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data backup and recovery readiness supported by real-time recovery<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">System redundancy and failover capabilities<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear incident response procedures<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Defined roles and responsibilities during disruptions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular testing and refinement of recovery plans aligned with<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/building-a-business-continuity-plan-that-actually-works\/\"> <span style=\"font-weight: 400\">business continuity planning<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Third-Party and Vendor Risk Cannot Be Ignored<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many SMBs rely heavily on third-party vendors for software, cloud services, and operational support. While these partnerships enable efficiency and scalability, they also introduce external risk. A security issue or outage at a vendor can directly impact your business.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Digital risk management must extend beyond internal systems to include vendor relationships. SMB leaders should understand how third-party dependencies affect overall risk exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Vendor-related digital risks often arise from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into vendor security practices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Overreliance on single providers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Weak contractual security requirements<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Shared access to sensitive data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inadequate contingency planning for vendor failures<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/8-1024x535.png\" \/><\/p>\n<h2><b>The Financial Impact of Digital Risk Is Often Underestimated<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many SMB leaders focus on the upfront cost of security and risk management initiatives while underestimating the financial consequences of inaction. Digital incidents frequently result in indirect costs that exceed initial expectations, including lost productivity, customer churn, and long-term recovery efforts.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Viewing digital risk through a financial lens helps leaders make more informed investment decisions. Proactive risk management is often more cost-effective than responding to incidents after they occur.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Financial exposure linked to digital risk includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Revenue loss from downtime and disruptions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased operational costs during recovery<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Long-term damage to customer relationships<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Higher insurance premiums or coverage limitations connected to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-cyber-insurance-is-no-longer-optional-for-small-businesses\/\"> <span style=\"font-weight: 400\">cyber insurance<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced valuation and growth potential<\/span><\/li>\n<\/ul>\n<h2><b>Why a Strategic IT Partner Is Essential for Managing Digital Risk<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Navigating today\u2019s digital risk landscape requires expertise, continuous monitoring, and strategic planning. Many SMBs lack the internal resources to manage these demands effectively. A trusted IT partner provides the guidance, tools, and oversight needed to reduce risk and support long-term success.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Western Suburbs, we help SMB leaders move from reactive responses to proactive risk management. Our approach focuses on understanding your business, identifying vulnerabilities, and building a secure, resilient technology environment that supports your goals.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A strategic IT partnership helps SMBs manage digital risk by providing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing risk assessment and visibility<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proactive security and system monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strategic guidance aligned with business objectives supported by IT strategy<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Support for compliance and governance needs<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Scalable solutions that evolve with the business through<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/managed-it-partnerships-the-key-to-sustainable-business-growth\/\"> <span style=\"font-weight: 400\">managed IT partnerships<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Conclusion: Leading With Confidence in a High-Risk Digital Environment<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Digital risk is an unavoidable reality for today\u2019s SMBs, but it does not have to be a barrier to growth. By understanding the evolving risk landscape and taking a proactive, strategic approach, business leaders can protect their organizations while enabling innovation and efficiency.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMB leaders who treat digital risk as a core business concern rather than a technical afterthought are better positioned to navigate uncertainty and build long-term resilience. CMIT Solutions of Western Suburbs is committed to helping businesses understand, manage, and reduce digital risk so they can operate with confidence in an increasingly complex digital world.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter  wp-image-648\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png\" alt=\"\" width=\"1000\" height=\"250\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-300x75.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-768x192.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2.png 1200w\" sizes=\"(max-width: 1000px) 100vw, 1000px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Digital risk is no longer a concern reserved for large enterprises with&#8230;<\/p>\n","protected":false},"author":1024,"featured_media":1670,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,39,43,29,20,32,16,23,26,22,31,24,35,47,46,25,27,34],"class_list":["post-1667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-monitoring","tag-ai-powered-apps-chicago","tag-cloud-compliance","tag-cloud-infrastructure-chicago","tag-cloud-services","tag-custom-it-solutions","tag-cybersecurity","tag-data-backup","tag-data-protection-and-recovery","tag-disaster-recovery","tag-it-compliance","tag-it-guidance","tag-it-infrastructure","tag-it-support-chicagowest","tag-managed-it-support-chocagowest","tag-managed-services-chicago","tag-network-management","tag-tech-support-chicago"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/users\/1024"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/comments?post=1667"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1667\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media\/1670"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media?parent=1667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/categories?post=1667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/tags?post=1667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}