{"id":1114,"date":"2026-04-24T03:55:18","date_gmt":"2026-04-24T08:55:18","guid":{"rendered":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/?p=1114"},"modified":"2026-04-24T03:58:05","modified_gmt":"2026-04-24T08:58:05","slug":"why-greenville-companies-are-turning-to-proactive-it-management-to-reduce-downtime","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/why-greenville-companies-are-turning-to-proactive-it-management-to-reduce-downtime\/","title":{"rendered":"Why Greenville Companies Are Turning to Proactive IT Management to Reduce Downtime"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Most businesses don\u2019t think about downtime until it happens.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">A system goes offline. A network slows down. Employees can\u2019t access critical tools.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Work stops.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Customers wait.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Revenue is impacted.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But downtime rarely happens without warning.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Long before systems fail, there are signs of small performance issues, minor disruptions, slow responses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The problem isn\u2019t that downtime is unpredictable.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">It\u2019s that it\u2019s often ignored until it becomes unavoidable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For businesses across the Greater Greenville region, this realization is driving a shift.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From reactive IT support\u2026<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">To proactive IT management.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This article explains why downtime is becoming a bigger business risk, why reactive approaches fall short, and how proactive IT management helps prevent disruptions before they happen.<\/span><\/p>\n<h2><b>Downtime Isn\u2019t Just an IT Issue It\u2019s a Business Problem<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When systems go down, the impact goes beyond technology.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It affects:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employee productivity<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer experience<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Internal operations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Business reputation<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Even short disruptions can create delays that ripple across the organization\u2014often tied to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-technology-problem-no-one-wants-to-admit-they-have\/\"> <span style=\"font-weight: 400\">hidden IT system problems<\/span><\/a><span style=\"font-weight: 400\"> that were never addressed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And in many cases, the real cost of downtime isn\u2019t just the outage\u00a0 It\u2019s the lost time and missed opportunities that follow.<\/span><\/p>\n<h2><b>The Hidden Build-Up Before Downtime Occurs<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most outages don\u2019t happen suddenly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They build over time through:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">System overload<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unresolved technical issues<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Outdated infrastructure<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of maintenance<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These issues often appear as:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Slower application performance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Intermittent connectivity problems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delayed system responses<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Individually, they seem manageable but are often dismissed due to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/why-everything-works-is-the-most-dangerous-phrase-in-business\/\"> <span style=\"font-weight: 400\">dangerous business assumptions<\/span><\/a><span style=\"font-weight: 400\"> that systems are functioning fine.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Together, they lead to failure.<\/span><\/p>\n<h2><b>Why Reactive IT Support Is No Longer Enough<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Traditional IT support focuses on fixing problems after they occur.<\/span><\/p>\n<p><span style=\"font-weight: 400\">A system fails \u00a0 A ticket is created \u00a0 The issue is resolved.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But this approach has limitations:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Problems are addressed too late<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Root causes may remain unresolved<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Downtime becomes recurring<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Reactive support keeps businesses running but not efficiently.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And not reliably especially in environments shaped by<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/how-growing-companies-accidentally-build-fragile-systems\/\"> <span style=\"font-weight: 400\">fragile system growth patterns<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>The Shift Toward Proactive IT Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Proactive IT management takes a different approach.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Instead of waiting for issues, it focuses on preventing them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous system monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular maintenance and updates<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Early detection of performance issues<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing optimization<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The goal isn\u2019t just fixing downtime.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s reducing the likelihood of it happening at all.<\/span><\/p>\n<p><img decoding=\"async\" class=\" wp-image-1116 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/54-1024x535.png\" alt=\"\" width=\"800\" height=\"418\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/54-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/54-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/54-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/54.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/p>\n<h2><b>Why Greenville Businesses Are Making the Change<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Companies in Greenville, Simpsonville, Spartanburg, and surrounding areas are facing increasing demands on their IT systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">More users.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">More applications.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">More reliance on cloud services.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At the same time, expectations are higher:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Faster performance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Constant availability<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure operations<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Reactive IT can\u2019t keep up with these demands especially with evolving<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/your-business-isnt-being-hacked-its-being-watched\/\"> <span style=\"font-weight: 400\">advanced cyber threat risks<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive management provides the consistency businesses need.<\/span><\/p>\n<h2><b>How Proactive IT Management Reduces Downtime<\/b><\/h2>\n<h2><b>Early Detection of Issues<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Continuous monitoring identifies problems before they escalate.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unusual system behavior<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Performance bottlenecks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Network instability<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Issues are addressed early before they impact operations.<\/span><\/p>\n<h2><b>Regular System Maintenance<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Routine updates and maintenance keep systems stable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This prevents:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Software conflicts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Performance degradation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security vulnerabilities<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Proper maintenance also reduces exposure to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/email-and-financial-fraud-how-smbs-can-spot-threats-early\/\"> <span style=\"font-weight: 400\">email fraud security threats<\/span><\/a><span style=\"font-weight: 400\"> and similar risks.<\/span><\/p>\n<h2><b>Infrastructure Optimization<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Proactive management ensures systems are aligned with current demands.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adjusting resources<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Improving network performance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Optimizing configurations<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Ignoring optimization often leads to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-digital-assumptions-that-cost-businesses-the-most\/\"> <span style=\"font-weight: 400\">digital assumption risks businesses<\/span><\/a><span style=\"font-weight: 400\"> fail to anticipate.<\/span><\/p>\n<h2><b>Faster Response When Issues Occur<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Even with prevention, issues can still arise.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive environments enable:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Faster identification of root causes<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Quicker resolution<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reduced downtime duration<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Response becomes efficient and controlled.<\/span><\/p>\n<h2><b>Improved Security and Stability<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Security incidents are a major cause of downtime.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive IT includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous monitoring for threats<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Timely patch management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong access controls<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This reduces risks from<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/preparing-your-small-business-for-advanced-phishing-and-ransomware-attacks\/\"> <span style=\"font-weight: 400\">advanced phishing attack methods<\/span><\/a><span style=\"font-weight: 400\"> and similar threats.<\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-1118 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/55-1024x535.png\" alt=\"\" width=\"831\" height=\"434\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/55-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/55-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/55-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/55.png 1200w\" sizes=\"(max-width: 831px) 100vw, 831px\" \/><\/p>\n<h2><b>The Business Impact of Reducing Downtime<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When downtime is minimized:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employees work without interruption<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer experiences improve<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operations run smoothly<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Revenue loss is reduced<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Confidence in systems increases<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Recovery readiness also depends on<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/minimizing-downtime-proven-backup-and-disaster-recovery-strategies\/\"> <span style=\"font-weight: 400\">backup and recovery strategies<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Technology becomes reliable and predictable.<\/span><\/p>\n<h2><b>What Proactive IT Management Looks Like in Practice<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Businesses that successfully reduce downtime share common practices:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">24\/7 system monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Structured patch and update processes<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular performance assessments<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized visibility across systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing infrastructure optimization<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">IT becomes an ongoing process not a one-time setup.<\/span><\/p>\n<h2><b>How CMIT Solutions of Greenville and West Supports Proactive IT Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Greenville and West, IT management is built around prevention, performance, and reliability.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Businesses across the Greater Greenville region benefit from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous monitoring of systems and networks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proactive maintenance and patch management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Early detection of potential issues<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Optimized infrastructure and performance tuning<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Integrated cybersecurity protections<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strategic IT guidance aligned with business needs<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The focus isn\u2019t just resolving issues.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s preventing them from disrupting your business in the first place.<\/span><\/p>\n<h2><b>Why This Shift Matters Now<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As businesses become more dependent on technology, the tolerance for downtime decreases.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Customers expect availability.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Employees expect performance.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Operations depend on consistency.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Reactive IT can\u2019t meet these expectations alone especially in regulated environments requiring<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/customer-data-privacy-turning-compliance-into-a-competitive-advantage\/\"> <span style=\"font-weight: 400\">data privacy compliance practices<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive management ensures systems are ready before problems arise.<\/span><\/p>\n<h2><b>Conclusion: Downtime Prevention Starts Before the Problem<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Downtime doesn\u2019t begin when systems fail.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It begins when early warning signs are missed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The businesses that reduce downtime aren\u2019t just faster at fixing problems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They\u2019re better at preventing them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because in today\u2019s environment, reliability isn\u2019t optional It\u2019s essential.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"><img decoding=\"async\" class=\" wp-image-764 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"800\" height=\"200\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 800px) 100vw, 800px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most businesses don\u2019t think about downtime until it happens. A system goes&#8230;<\/p>\n","protected":false},"author":212,"featured_media":1115,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[26,24,46,22,28,31,36,17,16,23,34,25],"class_list":["post-1114","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-it-support-greenville","tag-affordable-managed-it-services-in-greenville","tag-ai-cyber-threats-for-smbs","tag-business-it-support-greenville","tag-cloud-services-provider-greenville","tag-data-backup-and-disaster-recovery-greenville","tag-greenville-sc-cybersecurity-experts","tag-it-support-greenville","tag-managed-it-services-greenville","tag-outsourced-it-support-greenville","tag-remote-it-support-greenville","tag-small-business-it-support-greenville"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/1114","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/comments?post=1114"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/1114\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media\/1115"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media?parent=1114"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/categories?post=1114"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/tags?post=1114"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}