{"id":1675,"date":"2026-02-09T01:19:37","date_gmt":"2026-02-09T07:19:37","guid":{"rendered":"https:\/\/cmitsolutions.com\/chicago-il-1223\/?p=1675"},"modified":"2026-02-04T01:26:52","modified_gmt":"2026-02-04T07:26:52","slug":"the-real-risks-of-shadow-it-in-growing-professional-services-firms","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-real-risks-of-shadow-it-in-growing-professional-services-firms\/","title":{"rendered":"The Real Risks of Shadow IT in Growing Professional Services Firms"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Professional services firms thrive on expertise, efficiency, and trust. Whether delivering legal counsel, financial guidance, consulting services, or specialized advisory work, these firms depend heavily on technology to manage sensitive data, collaborate with clients, and maintain operational continuity. As firms grow, however, technology adoption often accelerates faster than governance. This environment creates fertile ground for<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/from-it-chaos-to-strategy-2025-digital-transformation-playbook-for-smbs\/\"> <span style=\"font-weight: 400\">Shadow IT<\/span><\/a><span style=\"font-weight: 400\"> technology systems and applications used without formal approval or oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Western Suburbs, we frequently work with growing professional services firms that are unknowingly exposed to significant risk due to Shadow IT. While these tools are often adopted with good intentions, they can undermine security, compliance, and operational stability. Understanding the real risks of Shadow IT is essential for firms seeking sustainable, secure growth.<\/span><\/p>\n<h2><b>What Shadow IT Really Means in Professional Services Firms<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT refers to any technology, application, or service used within an organization without the knowledge or approval of IT leadership. In professional services firms, Shadow IT often emerges when teams seek faster ways to collaborate, share files, or manage projects outside of established systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because these tools often solve immediate problems, they may initially appear harmless. However, when technology usage occurs outside of governance frameworks, visibility and control are lost. Over time, Shadow IT becomes embedded in daily workflows, increasing organizational risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To understand how Shadow IT typically manifests in professional services firms, consider the following common scenarios:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use of unauthorized cloud storage for client documents<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adoption of unapproved collaboration or messaging tools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Personal email accounts used for business communication<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Independent software subscriptions purchased by departments<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Client data stored outside approved systems<\/span><\/li>\n<\/ul>\n<h2><b>Why Shadow IT Proliferates as Firms Grow<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Growth introduces complexity. As professional services firms expand, new teams, clients, and service lines create pressure for faster and more flexible technology solutions. When official IT processes are perceived as slow or restrictive, employees often seek alternatives that allow them to work more efficiently.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT frequently arises from gaps between business needs and IT capabilities. Without a clear strategy for evaluating and onboarding new tools, well-intentioned employees bypass formal channels, unknowingly increasing risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT becomes more prevalent during growth due to factors such as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Rapid onboarding of new employees and teams<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased demand for remote and mobile work tools supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/how-to-future-proof-your-hybrid-workforce-in-chicago-with-the-right-it-tools\/\"> <span style=\"font-weight: 400\">hybrid workforce tools<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into evolving workflow requirements<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delays in approving or deploying new technology<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of clear communication between IT and business units<\/span><\/li>\n<\/ul>\n<h2><b>The Security Risks Hidden Within Shadow IT<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Security is one of the most significant risks associated with Shadow IT. Unauthorized tools often lack proper configuration, monitoring, and patch management. Without centralized oversight, vulnerabilities can go unnoticed, creating easy entry points for cyber threats.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In professional services firms, where sensitive client information is routinely handled, these security gaps can have serious consequences. Data exposure not only impacts operations but also erodes client trust.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT introduces security risks by creating:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unmonitored access points into the network<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent security controls across applications<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Weak or unmanaged authentication practices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into data movement and access<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delayed detection of suspicious activity tied to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/cybersecurity-forecast-2025-threats-trends-and-the-msp-response\/\"> <span style=\"font-weight: 400\">cybersecurity trends<\/span><\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-1677\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/12-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/12-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/12-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/12-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/12.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Compliance and Regulatory Exposure Increases Significantly<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many professional services firms operate under strict regulatory and ethical obligations. Unauthorized technology use makes it difficult to ensure compliance with data protection, confidentiality, and record-keeping requirements.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT often bypasses established policies and controls designed to support compliance. When audits or legal reviews occur, firms may struggle to account for where data is stored or who has access to it.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Compliance-related risks associated with Shadow IT include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inability to enforce data retention and deletion policies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of audit trails and documentation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unauthorized sharing of confidential client information<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent application of access controls<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased exposure during regulatory reviews connected to<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/top-it-compliance-challenges-for-small-businesses-and-how-to-solve-them\/\"> <span style=\"font-weight: 400\">compliance challenges<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Client Confidentiality and Trust Are Put at Risk<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Trust is foundational in professional services. Clients expect their sensitive information to be handled securely and responsibly. Shadow IT undermines this trust by introducing uncontrolled environments where data may be shared, stored, or accessed without proper safeguards.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Even a single incident involving unauthorized technology can damage a firm\u2019s reputation and strain client relationships. Rebuilding trust after such an event can be costly and time-consuming.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT threatens client confidentiality through:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use of consumer-grade tools lacking enterprise security<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data stored outside approved and monitored systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent encryption and access controls<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased likelihood of accidental data exposure<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited ability to demonstrate responsible data handling supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/the-digital-trust-factor-building-customer-confidence-through-strong-it-practices\/\"> <span style=\"font-weight: 400\">digital trust<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Operational Inefficiencies Multiply Over Time<\/b><\/h2>\n<p><span style=\"font-weight: 400\">While Shadow IT may initially appear to improve efficiency, it often creates long-term operational challenges. Disconnected systems lead to fragmented workflows, duplicate data, and confusion over which tools are authoritative.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As Shadow IT grows, firms lose the ability to standardize processes and support systems effectively. IT teams are left troubleshooting tools they didn\u2019t approve or configure, increasing support complexity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Operational inefficiencies caused by Shadow IT include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Redundant tools performing similar functions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Manual data transfer between systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased training complexity for staff<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Difficulty supporting and troubleshooting issues<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced consistency across service delivery<\/span><\/li>\n<\/ul>\n<h2><b>Data Management and Visibility Break Down<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Effective data management relies on consistency and visibility. Shadow IT disrupts both by scattering information across multiple unauthorized platforms. This fragmentation makes it difficult to track data usage, ensure accuracy, or apply governance policies.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without centralized data management, firms may struggle to generate reliable insights or respond quickly to information requests. Decision-making becomes slower and less informed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT undermines data management by causing:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data silos across unauthorized applications<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent or outdated information<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited insight into data access and usage<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Difficulty enforcing data governance policies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced confidence in business intelligence<\/span><\/li>\n<\/ul>\n<h2><b>Financial Risks and Uncontrolled Spending Grow<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT often leads to unplanned and untracked technology spending. Individual teams may purchase subscriptions independently, resulting in overlapping tools and inefficient use of resources. Over time, these costs accumulate without delivering proportional value.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In addition to direct expenses, Shadow IT creates indirect financial risk through inefficiency, downtime, and increased support demands.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Financial risks associated with Shadow IT include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Duplicate or unnecessary software subscriptions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of visibility into total IT spend<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Higher support and maintenance costs<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Increased risk of costly incidents or disruptions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Difficulty forecasting technology budgets improved by<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/smart-it-spending-turning-budget-constraints-into-technology-advantages\/\"> <span style=\"font-weight: 400\">smart IT spending<\/span><\/a><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter size-large wp-image-1678\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/13-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/13-1024x535.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/13-300x157.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/13-768x401.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2026\/02\/13.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Leadership Loses Control Over Technology Direction<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When Shadow IT becomes widespread, leadership loses visibility and control over the firm\u2019s technology environment. Technology decisions are made in silos, undermining strategic planning and alignment with business goals.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without centralized oversight, firms struggle to build a cohesive IT roadmap. This lack of direction limits the ability to scale securely and adapt to future needs, especially when leaders need to rethink<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/why-its-time-for-chicago-west-companies-to-rethink-their-it-strategy-in-2025\/\"> <span style=\"font-weight: 400\">IT strategy<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Shadow IT erodes leadership control by creating:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Disconnected technology decision-making<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent standards across departments<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into risks and dependencies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Difficulty aligning IT with strategic objectives<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced ability to plan for long-term growth<\/span><\/li>\n<\/ul>\n<h2><b>Establishing Governance Without Stifling Innovation<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Eliminating Shadow IT does not mean restricting innovation. Instead, it requires creating clear governance frameworks that balance flexibility with security and control. Professional services firms must foster collaboration between IT and business teams to ensure technology needs are met responsibly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Western Suburbs, we help firms establish governance models that provide structure without slowing progress. By improving communication, streamlining approval processes, and offering secure alternatives, firms can reduce Shadow IT while empowering their teams.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Effective governance strategies include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear policies for technology evaluation and approval<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Open communication between IT and business units<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure, standardized tools that meet user needs such as<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/ucaas-security-in-2025-protecting-calls-chats-and-virtual-meetings\/\"> <span style=\"font-weight: 400\">UCaaS security<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular audits of technology usage<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing education about risks and best practices<\/span><\/li>\n<\/ul>\n<h2><b>Conclusion: Addressing Shadow IT Before It Undermines Growth<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Shadow IT is a common challenge for growing professional services firms, but it is far from harmless. Left unchecked, it introduces security vulnerabilities, compliance risks, operational inefficiencies, and financial exposure. More importantly, it threatens the trust that clients place in professional services organizations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By recognizing the risks and taking a proactive, strategic approach to governance, firms can regain control of their technology environments without sacrificing agility. CMIT Solutions of Western Suburbs partners with professional services firms to identify Shadow IT, reduce risk, and build secure, scalable technology foundations that support long-term success through<\/span><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/blog\/managed-it-partnerships-the-key-to-sustainable-business-growth\/\"> <span style=\"font-weight: 400\">managed IT partnerships<\/span><\/a><span style=\"font-weight: 400\">.\u00a0<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter size-large wp-image-648\" src=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-1024x256.png 1024w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-300x75.png 300w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2-768x192.png 768w, https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-content\/uploads\/sites\/239\/2025\/07\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-2.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Professional services firms thrive on expertise, efficiency, and trust. Whether delivering legal&#8230;<\/p>\n","protected":false},"author":1024,"featured_media":1676,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[18,39,43,29,20,40,17,19,21,32,16,23,26,22,41,31,24,35,47,49,46,25,27],"class_list":["post-1675","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-monitoring","tag-ai-powered-apps-chicago","tag-cloud-compliance","tag-cloud-infrastructure-chicago","tag-cloud-services","tag-cloud-enabled","tag-cmit-chicagowest","tag-cmit-solutions","tag-compliance","tag-custom-it-solutions","tag-cybersecurity","tag-data-backup","tag-data-protection-and-recovery","tag-disaster-recovery","tag-endpoint-detection-and-response","tag-it-compliance","tag-it-guidance","tag-it-infrastructure","tag-it-support-chicagowest","tag-it-support-in-chicago","tag-managed-it-support-chocagowest","tag-managed-services-chicago","tag-network-management"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1675","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/users\/1024"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/comments?post=1675"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/posts\/1675\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media\/1676"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/media?parent=1675"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/categories?post=1675"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/chicago-il-1223\/wp-json\/wp\/v2\/tags?post=1675"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}