{"id":901,"date":"2026-03-05T03:04:48","date_gmt":"2026-03-05T09:04:48","guid":{"rendered":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/?p=901"},"modified":"2026-03-05T03:04:48","modified_gmt":"2026-03-05T09:04:48","slug":"your-business-isnt-being-hacked-its-being-watched","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/your-business-isnt-being-hacked-its-being-watched\/","title":{"rendered":"Your Business Isn\u2019t Being Hacked It\u2019s Being Watched"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Most business owners imagine cyberattacks as loud, disruptive events. Systems lock up. Files disappear. Ransom notes appear on screens.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But the more dangerous reality is quieter.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Long before a breach becomes visible, attackers are often watching. Mapping your systems. Studying employee behavior. Identifying weak access points. Testing login credentials. Observing traffic patterns.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By the time you realize you\u2019ve been \u201chacked,\u201d the observation phase may have been happening for weeks or months.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This isn\u2019t paranoia. It\u2019s how modern cybercrime works.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And if your organization isn\u2019t built to detect that early surveillance activity, you\u2019re not just vulnerable to attacks you\u2019re unknowingly hosting them.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This article breaks down how passive cyber observation works, why it\u2019s so common in small and mid-sized businesses, and how to stop being watched before you become the next headline.<\/span><\/p>\n<h2><b>The Silent Phase of a Cyberattack<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Most breaches don\u2019t begin with disruption. They begin with access.<\/span><\/p>\n<p><span style=\"font-weight: 400\">An attacker gains entry through:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">A phishing email<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">A reused password<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">An unpatched vulnerability<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Exposed remote access<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">A misconfigured cloud setting<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Once inside, they rarely act immediately.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Instead, they escalate privileges quietly, identify high-value systems, monitor internal communications, track financial workflows, and observe vendor relationships.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The goal isn\u2019t chaos it\u2019s intelligence.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This reconnaissance phase allows attackers to plan targeted, profitable actions like business email compromise, ransomware deployment, and data exfiltration. As discussed in our article on the<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-rise-of-ai-cyber-threats-and-how-small-businesses-can-respond\/\"> <span style=\"font-weight: 400\">rise of AI cyber threats<\/span><\/a><span style=\"font-weight: 400\">, modern attackers are becoming increasingly patient and strategic.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The longer they observe, the more precise the attack becomes.<\/span><\/p>\n<h2><b>Why Small and Mid-Sized Businesses Are Prime Targets<\/b><\/h2>\n<p><span style=\"font-weight: 400\">There\u2019s a dangerous myth that only large enterprises get watched.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In reality, small and mid-sized businesses are often preferred targets because they typically have fewer internal IT resources, limited security monitoring, inconsistent patching practices, minimal log review, and no dedicated security operations oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Attackers understand that many growing businesses focus on productivity first and security second. That gap creates opportunity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without proactive oversight like structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/managed-it-services\/\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\">, suspicious activity blends into normal system noise. Logins at unusual times. Repeated authentication attempts. Minor configuration changes. Small data transfers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Individually, these events may look harmless. Together, they can signal early-stage compromise.<\/span><\/p>\n<h2><b>The Cost of Being Watched<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Observation is not harmless.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When attackers watch your systems, they gain operational insight into approvals and financial workflows. They identify credential weaknesses and MFA gaps. They wait for payroll cycles or executive travel. They map critical infrastructure before launching ransomware.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Many Greenville business leaders underestimate how observation aligns with broader<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/essential-it-risk-management-tips-for-greenville-business-leaders\/\"> <span style=\"font-weight: 400\">IT risk management strategies<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">By the time the visible attack occurs, the groundwork is complete.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Breaches feel sudden. They aren\u2019t sudden they\u2019re executed.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-903 size-large\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/9-1024x535.png\" alt=\"Cybersecurity monitoring and threat protection for businesses CMIT Greenville\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/9-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/9-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/9-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/9.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>What Early Warning Signs Actually Look Like<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Modern threats don\u2019t announce themselves. But they do leave indicators:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Repeated failed login attempts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Logins from unfamiliar locations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Creation of new admin accounts<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Changes to email forwarding rules<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Small irregular data transfers<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Disabled security alerts<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">The issue isn\u2019t the absence of warning signs.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s the absence of centralized monitoring something that becomes critical in maintaining<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/building-resilient-it-infrastructure-for-24-7-business-operations\/\"> <span style=\"font-weight: 400\">resilient IT infrastructure<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security tools may exist, but without coordination, they operate in isolation.<\/span><\/p>\n<h2><b>Why Basic Security Tools Aren\u2019t Enough<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many organizations believe they are protected because they have antivirus software, firewalls, and email filtering.<\/span><\/p>\n<p><span style=\"font-weight: 400\">These tools matter. But they don\u2019t detect behavioral anomalies.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cybercriminals now use legitimate credentials and approved access paths. They blend in using normal administrative tools.<\/span><\/p>\n<p><span style=\"font-weight: 400\">That\u2019s why modern protection requires layered<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-service-cybersecurity\/\"> <span style=\"font-weight: 400\">IT cybersecurity services<\/span><\/a><span style=\"font-weight: 400\"> combined with centralized visibility.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security isn\u2019t just about building walls.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s about watching the watchers.<\/span><\/p>\n<h2><b>The Role of Patch Management in Preventing Surveillance<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Unpatched systems remain one of the easiest entry points for attackers.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Automated scanning tools constantly search for exposed vulnerabilities. Once access is gained, silent observation begins.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Structured patching within professional<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-support\/\"> <span style=\"font-weight: 400\">IT support services<\/span><\/a><span style=\"font-weight: 400\"> closes these windows before exploitation occurs.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Effective patch management requires:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Defined update schedules<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Visibility into patch status<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Documentation of exceptions<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing vulnerability scanning<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Without oversight, businesses leave digital doors open.<\/span><\/p>\n<h2><b>Access Controls: Limiting What Observers Can See<\/b><\/h2>\n<p><span style=\"font-weight: 400\">If a single employee account is compromised, what systems become accessible?<\/span><\/p>\n<p><span style=\"font-weight: 400\">Role-based permissions dramatically reduce exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Strong access governance often falls under comprehensive<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-guidance\/\"> <span style=\"font-weight: 400\">IT guidance services<\/span><\/a><span style=\"font-weight: 400\">, ensuring privileges align with job functions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Observation becomes far less valuable when visibility is restricted.<\/span><\/p>\n<h2><b>Security Monitoring That Detects Behavior, Not Just Threats<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The difference between being hacked and being watched comes down to monitoring maturity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive monitoring identifies anomalous login patterns, suspicious privilege escalation, lateral movement, and abnormal data access.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cloud environments especially require visibility across platforms, which is why integrated<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/cloud-services\/\"> <span style=\"font-weight: 400\">cloud security solutions<\/span><\/a><span style=\"font-weight: 400\"> are critical for modern businesses.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without centralized logs and oversight, surveillance activity can continue undetected.<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-large wp-image-904 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/10-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/10-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/10-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/10-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/10.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>Compliance and Incident Response Readiness<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Regulated industries face even higher stakes.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Observation without detection can create serious compliance exposure, particularly in healthcare, legal, and financial sectors. Maintaining strong<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/compliance\/\"> <span style=\"font-weight: 400\">IT compliance standards<\/span><\/a><span style=\"font-weight: 400\"> ensures monitoring and documentation processes are structured and defensible.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Industries like law firms must integrate cybersecurity into broader digital transformation, as outlined in our discussion of<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/digital-transformation-strategies-that-protect-client-data-in-law-firms\/\"> <span style=\"font-weight: 400\">data protection strategies for law firms<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Prepared organizations don\u2019t panic when suspicious activity appears\u2014they investigate systematically.<\/span><\/p>\n<h2><b>Proactive Cybersecurity in Practice<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Organizations that prevent observation-based attacks share consistent characteristics:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Automated patching<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Regular access reviews<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Validated backups<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Documented workflows<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Defined response plans<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">They also align procurement decisions with security objectives through structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-services-it-procurement\/\"> <span style=\"font-weight: 400\">IT procurement planning<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security becomes operational not reactive.<\/span><\/p>\n<h2><b>How CMIT Solutions of Greenville and West Supports Proactive Defense<\/b><\/h2>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Greenville and West, cybersecurity is treated as a continuous operational discipline\u2014not a one-time configuration.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Through comprehensive<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/managed-it-services\/\"> <span style=\"font-weight: 400\">managed IT support<\/span><\/a><span style=\"font-weight: 400\">, businesses gain:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Structured patch oversight<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized log visibility<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Continuous behavioral monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strengthened access controls<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Documented security frameworks<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Staying informed on evolving threats like those highlighted in our insights on<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/top-cybersecurity-trends-greenville-smbs-should-watch-in-2026\/\"> <span style=\"font-weight: 400\">cybersecurity trends for 2026<\/span><\/a><span style=\"font-weight: 400\"> helps businesses remain ahead of emerging surveillance tactics.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The goal isn\u2019t just preventing hacks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s eliminating the quiet observation phase that makes them possible.<\/span><\/p>\n<h2><b>The Business Impact of Staying Ahead<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When systems are actively monitored:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Risk exposure decreases<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Downtime becomes less likely<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Compliance posture strengthens<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Leadership gains confidence<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Security shifts from liability to competitive advantage.<\/span><\/p>\n<p><span style=\"font-weight: 400\">And attackers lose the invisible window they depend on.<\/span><\/p>\n<h2><b>Conclusion: The Real Threat Is the One You Don\u2019t See<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cyberattacks rarely begin with chaos.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They begin with watching.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The longer observation goes undetected, the more precise and damaging the eventual attack becomes.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Strong cybersecurity isn\u2019t defined by how quickly you recover after a breach.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s defined by how effectively you prevent silent surveillance from turning into crisis.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If your organization lacks visibility into who is accessing what, when, and why, the risk isn\u2019t theoretical.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s operational.<\/span><\/p>\n<h2><b>Ready to Stop Being Watched?<\/b><\/h2>\n<p><span style=\"font-weight: 400\">If you\u2019re unsure whether your business has the monitoring, patching, and access controls needed to detect early-stage threats, now is the time to evaluate your environment.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Schedule a consultation through our<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"> <span style=\"font-weight: 400\">contact page<\/span><\/a><span style=\"font-weight: 400\"> to assess your current defenses and strengthen your cybersecurity posture.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because the safest systems aren\u2019t the ones that recover quickly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They\u2019re the ones that never give attackers the chance to watch in the first place.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"><img decoding=\"async\" class=\"size-large wp-image-764 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most business owners imagine cyberattacks as loud, disruptive events. Systems lock up&#8230;.<\/p>\n","protected":false},"author":212,"featured_media":902,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[26,24,22,28,42,40,19,27,36,41],"class_list":["post-901","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-it-support-greenville","tag-affordable-managed-it-services-in-greenville","tag-business-it-support-greenville","tag-cloud-services-provider-greenville","tag-compliance-and-incident-response-readiness","tag-cyberattack","tag-cybersecurity-services-greenville","tag-cybersecurity-solutions-for-businesses-in-greenville","tag-greenville-sc-cybersecurity-experts","tag-mid-sized-businesses-are"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/901","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/comments?post=901"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/901\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media\/902"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media?parent=901"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/categories?post=901"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/tags?post=901"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}