{"id":1129,"date":"2026-04-29T04:10:16","date_gmt":"2026-04-29T09:10:16","guid":{"rendered":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/?p=1129"},"modified":"2026-04-27T04:18:27","modified_gmt":"2026-04-27T09:18:27","slug":"what-every-business-should-know-about-protecting-sensitive-company-data","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/what-every-business-should-know-about-protecting-sensitive-company-data\/","title":{"rendered":"What Every Business Should Know About Protecting Sensitive Company Data"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Most businesses assume their data is secure because nothing has gone wrong yet.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Files are accessible. Systems are running. Employees are working as usual.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But data protection isn\u2019t measured by the absence of problems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s measured by how well your business is prepared for the risks you don\u2019t see.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because in today\u2019s environment, sensitive company data is one of the most targeted\u2014and most valuable assets.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And for businesses across the Greater Greenville region, protecting that data is no longer optional.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s operational.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This article explains what sensitive data really includes, why it\u2019s at risk, and how businesses can protect it effectively before exposure becomes a serious issue.<\/span><\/p>\n<h2><b>Sensitive Data Is Broader Than Most Businesses Realize<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When people think of sensitive data, they often think of financial records or customer information.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But in reality, it includes much more.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Sensitive company data can include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employee records and payroll information<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer databases and contact details<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Financial documents and transactions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Internal communications and emails<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Contracts, proposals, and business plans<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Login credentials and access information<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">If accessed improperly, any of this data can be used to disrupt operations or cause damage\u2014especially in environments lacking<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/legal-tech-innovations-streamlining-case-management-with-secure-digital-tools\/\"> <span style=\"font-weight: 400\">secure digital workflow systems<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Why Data Has Become a Primary Target<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyber threats today are not just about system disruption.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They are focused on data.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because data can be:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sold<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Exploited<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Used for fraud<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Leveraged for ransomware<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">For attackers, accessing data often provides more value than shutting systems down often through<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/your-business-isnt-being-hacked-its-being-watched\/\"> <span style=\"font-weight: 400\">hidden cyber threat activity<\/span><\/a><span style=\"font-weight: 400\"> that goes unnoticed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And once data is exposed, the impact can extend far beyond the initial incident.<\/span><\/p>\n<h2><b>Why Greenville Businesses Face Increasing Data Risks<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Businesses in Greenville, Simpsonville, Spartanburg, and surrounding areas are becoming more digitally connected.<\/span><\/p>\n<p><span style=\"font-weight: 400\">More cloud usage.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">More remote access.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">More shared data across platforms.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At the same time, many organizations:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack centralized visibility<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use multiple disconnected tools<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Have limited internal security oversight<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This creates risk environments often tied to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-technology-problem-no-one-wants-to-admit-they-have\/\"> <span style=\"font-weight: 400\">hidden IT system problems<\/span><\/a><span style=\"font-weight: 400\"> that businesses overlook.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-1131\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/8-2-1024x535.png\" alt=\"Protecting Company Data Best Practices\" width=\"831\" height=\"434\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/8-2-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/8-2-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/8-2-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/8-2.png 1200w\" sizes=\"(max-width: 831px) 100vw, 831px\" \/><\/p>\n<h2><b>The Most Common Ways Data Gets Exposed<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Data breaches don\u2019t always come from complex attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They often start with simple gaps.<\/span><\/p>\n<h2><b>Weak Access Controls<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When access isn\u2019t properly managed:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Too many users have access to sensitive data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Permissions are not aligned with roles<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Old or unused accounts remain active<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">This increases the risk of unauthorized access often due to<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/why-everything-works-is-the-most-dangerous-phrase-in-business\/\"> <span style=\"font-weight: 400\">dangerous business assumptions<\/span><\/a><span style=\"font-weight: 400\"> about user access.<\/span><\/p>\n<p>&nbsp;<\/p>\n<h2><b>Unsecured Devices and Endpoints<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Laptops, mobile devices, and remote systems can become entry points.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without proper protection:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data can be accessed or stolen<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Devices can be compromised<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security controls can be bypassed<\/span><\/li>\n<\/ul>\n<h2><b>Lack of Encryption<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Data that isn\u2019t encrypted is easier to access if intercepted.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This applies to:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data stored on systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data transferred across networks<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Encryption adds a critical layer of protection.<\/span><\/p>\n<h2><b>Human Error<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Employees play a major role in data security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Common risks include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clicking phishing links<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Sharing sensitive information unintentionally<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Using weak passwords<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">These risks often align with<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-digital-assumptions-that-cost-businesses-the-most\/\"> <span style=\"font-weight: 400\">digital assumption risks businesses<\/span><\/a><span style=\"font-weight: 400\"> underestimate.<\/span><\/p>\n<h2><b>Limited Monitoring and Visibility<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Without monitoring:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Suspicious activity goes unnoticed<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unauthorized access isn\u2019t detected<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data movement isn\u2019t tracked<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Businesses often don\u2019t realize exposure until it\u2019s too late\u2014similar to patterns in<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/when-software-starts-making-business-decisions-without-you\/\"> <span style=\"font-weight: 400\">automated system decision risks<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>The Real Cost of Poor Data Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Data exposure doesn\u2019t just affect IT systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It impacts the entire business.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The consequences may include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Financial loss<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Legal and compliance issues<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Loss of customer trust<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operational disruption<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Reputational damage<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">System inefficiencies can worsen these issues, especially with<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/why-your-business-runs-slower-after-every-upgrade\/\"> <span style=\"font-weight: 400\">post upgrade performance issues<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><img decoding=\"async\" class=\"wp-image-1132 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/9-2-1024x535.png\" alt=\"\" width=\"836\" height=\"437\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/9-2-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/9-2-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/9-2-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/04\/9-2.png 1200w\" sizes=\"(max-width: 836px) 100vw, 836px\" \/><\/p>\n<h2><b>Why Basic Security Measures Are Not Enough<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Having antivirus or firewalls in place is important\u2014but not sufficient.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Modern threats:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Use legitimate credentials<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Exploit normal system behavior<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Target data directly<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Protecting data requires more than perimeter security.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It requires control, visibility, and coordination.<\/span><\/p>\n<h2><b>Building a Strong Data Protection Strategy<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Effective data protection involves multiple layers working together.<\/span><\/p>\n<h2><b>Access Control and Identity Management<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Ensure users only have access to what they need.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Role-based permissions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Multi-factor authentication (MFA)<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular access reviews<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Limiting access reduces exposure.<\/span><\/p>\n<h2><b>Data Encryption and Secure Storage<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Protect data both at rest and in transit.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This ensures that even if data is accessed, it cannot be easily used.<\/span><\/p>\n<h2><b>Continuous Monitoring and Threat Detection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Monitor systems for:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unusual access patterns<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Data transfers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unauthorized activity<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Early detection prevents escalation especially in environments with<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/how-growing-companies-accidentally-build-fragile-systems\/\"> <span style=\"font-weight: 400\">fragile system growth patterns<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Regular Backups and Recovery Planning<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Ensure data can be restored if needed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This includes:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Frequent backups<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure storage<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Tested recovery processes<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Strong<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/minimizing-downtime-proven-backup-and-disaster-recovery-strategies\/\"> <span style=\"font-weight: 400\">backup and recovery strategies<\/span><\/a><span style=\"font-weight: 400\"> are essential for resilience.<\/span><\/p>\n<h2><b>Employee Awareness and Training<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Employees should understand:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to recognize threats<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to handle sensitive data<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">How to report suspicious activity<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Security becomes stronger when everyone is involved.<\/span><\/p>\n<h2><b>How CMIT Solutions of Greenville and West Helps Protect Business Data<\/b><\/h2>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Greenville, data protection is approached as an ongoing process not a one-time setup.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Businesses across the Greater Greenville region benefit from:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized monitoring and visibility across systems<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong access control and identity management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure data storage and encryption practices<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Proactive threat detection and response<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Structured backup and recovery solutions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing security awareness support<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The focus isn\u2019t just protecting systems.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s protecting the data that drives your business.<\/span><\/p>\n<h2><b>The Business Impact of Strong Data Protection<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When data is properly protected:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Risk of exposure is reduced<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compliance becomes easier to manage<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer trust is strengthened<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operations remain stable<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Leadership gains confidence<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Data becomes a secure asset not a vulnerability.<\/span><\/p>\n<h2><b>Conclusion: Data Protection Is a Business Responsibility<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Sensitive data is one of the most valuable parts of your business.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And one of the most targeted.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Protecting it isn\u2019t just an IT task.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s a business priority.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because the impact of data exposure doesn\u2019t stay contained.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It affects everything connected to your organization.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"><img decoding=\"async\" class=\" wp-image-764 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"832\" height=\"208\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 832px) 100vw, 832px\" \/><\/a><\/p>\n<p><span style=\"font-weight: 400\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most businesses assume their data is secure because nothing has gone wrong&#8230;<\/p>\n","protected":false},"author":212,"featured_media":1130,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[26,24,22,28,25],"class_list":["post-1129","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-it-support-greenville","tag-affordable-managed-it-services-in-greenville","tag-business-it-support-greenville","tag-cloud-services-provider-greenville","tag-small-business-it-support-greenville"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/1129","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/comments?post=1129"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/1129\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media\/1130"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media?parent=1129"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/categories?post=1129"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/tags?post=1129"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}