{"id":905,"date":"2026-03-05T03:29:31","date_gmt":"2026-03-05T09:29:31","guid":{"rendered":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/?p=905"},"modified":"2026-03-05T03:30:34","modified_gmt":"2026-03-05T09:30:34","slug":"the-technology-problem-no-one-wants-to-admit-they-have","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-technology-problem-no-one-wants-to-admit-they-have\/","title":{"rendered":"The Technology Problem No One Wants to Admit They Have"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Most business owners are comfortable talking about growth strategies, revenue targets, hiring plans, and customer experience improvements.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But there\u2019s one issue many leadership teams quietly avoid:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Their technology environment is more fragile than they\u2019re willing to admit.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It works until it doesn\u2019t.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">It feels manageable until it breaks.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">It seems secure until something slips through.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The uncomfortable truth is that many small and mid-sized businesses aren\u2019t suffering from a lack of technology. They\u2019re suffering from unmanaged complexity.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This is the technology problem no one wants to admit they have.<\/span><\/p>\n<h2><b>When \u201cIt Works\u201d Isn\u2019t the Same as \u201cIt\u2019s Healthy\u201d<\/b><\/h2>\n<p><span style=\"font-weight: 400\">A common mindset in growing businesses is simple:<\/span><\/p>\n<p><span style=\"font-weight: 400\">\u201cIf everything is running, we\u2019re fine.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">But operational technology health isn\u2019t measured by whether systems are currently online. It\u2019s measured by how consistently systems are maintained, how quickly issues are detected, and how well IT aligns with long-term objectives through structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-guidance\/\"> <span style=\"font-weight: 400\">IT guidance services<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Many companies operate in a reactive model. They fix issues when something breaks. They update systems when required. They address security concerns after a scare.<\/span><\/p>\n<p><span style=\"font-weight: 400\">That approach may keep things functioning\u2014but it doesn\u2019t create resilience. As outlined in our discussion on<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/building-resilient-it-infrastructure-for-24-7-business-operations\/\"> <span style=\"font-weight: 400\">resilient IT infrastructure<\/span><\/a><span style=\"font-weight: 400\">, long-term stability requires structure, not improvisation.<\/span><\/p>\n<h2><b>The Hidden Signs of Technology Debt<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology debt builds slowly. It doesn\u2019t announce itself.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It shows up as outdated hardware, unsupported software versions, inconsistent patching practices, and fragmented systems across multiple cloud environments without unified<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/cloud-services\/\"> <span style=\"font-weight: 400\">cloud management solutions<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Employees begin using unsanctioned tools. Documentation becomes incomplete. Integration gaps widen.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Individually, these issues seem manageable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Collectively, they create operational instability and security exposure\u2014something Greenville leaders are increasingly addressing through structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/essential-it-risk-management-tips-for-greenville-business-leaders\/\"> <span style=\"font-weight: 400\">IT risk management planning<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The real problem isn\u2019t their presence it\u2019s their normalization.<\/span><\/p>\n<h2><b>Security Gaps That Feel Invisible<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the most overlooked challenges is false cybersecurity confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Many organizations assume they\u2019re protected because they have antivirus software, a firewall, multi-factor authentication, and email filtering.<\/span><\/p>\n<p><span style=\"font-weight: 400\">These tools matter. But tools without oversight create blind spots.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Common unseen gaps include unreviewed administrative privileges, dormant user accounts, incomplete log monitoring, and unpatched third-party applications.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Modern threats\u2014including those discussed in our analysis of the<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/the-rise-of-ai-cyber-threats-and-how-small-businesses-can-respond\/\"> <span style=\"font-weight: 400\">rise of AI threats<\/span><\/a><span style=\"font-weight: 400\"> exploit exactly these inconsistencies.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security isn\u2019t defined by installing tools. It\u2019s defined by maintaining layered<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-service-cybersecurity\/\"> <span style=\"font-weight: 400\">cybersecurity protection services<\/span><\/a><span style=\"font-weight: 400\"> with continuous review.<\/span><\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-907 \" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/11-1024x535.png\" alt=\"Managed IT solutions for secure and stable business operations Greenville\" width=\"865\" height=\"452\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/11-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/11-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/11-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/11.png 1200w\" sizes=\"(max-width: 865px) 100vw, 865px\" \/><\/p>\n<h2><b>Operational Bottlenecks That Slow Growth<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology problems don\u2019t always present as outages. Often, they show up as friction.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Slow systems.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">File access confusion.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Login delays.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Remote connectivity challenges.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Platform communication breakdowns.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Employees adapt. But those inefficiencies compound.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Organizations exploring<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/smarter-collaboration-tools-boosting-productivity-for-remote-teams\/\"> <span style=\"font-weight: 400\">smarter collaboration tools<\/span><\/a><span style=\"font-weight: 400\"> often discover that inefficiency stems not from the tools themselves but from inconsistent configuration and oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">When teams spend time working around systems instead of leveraging them, productivity quietly declines.<\/span><\/p>\n<h2><b>Compliance and Documentation Weaknesses<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Another uncomfortable reality: many businesses appear compliant but lack documented proof of consistent oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Policies exist but are they reviewed?<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Backups run but are recovery tests documented?<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Security controls operate but are they audited?<\/span><\/p>\n<p><span style=\"font-weight: 400\">Structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/compliance\/\"> <span style=\"font-weight: 400\">IT compliance management<\/span><\/a><span style=\"font-weight: 400\"> ensures controls are both implemented and verifiable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Industries such as law firms face increasing scrutiny, particularly during digital transformation efforts. Our article on<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/digital-transformation-strategies-that-protect-client-data-in-law-firms\/\"> <span style=\"font-weight: 400\">data protection for law firms<\/span><\/a><span style=\"font-weight: 400\"> highlights how documentation gaps can create significant exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Compliance isn\u2019t about paperwork\u2014it\u2019s about defensible oversight.<\/span><\/p>\n<h2><b>The Myth of \u201cWe\u2019ll Deal With It Later\u201d<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology challenges are often postponed because they aren\u2019t urgent yet.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Leadership prioritizes revenue growth. Security reviews are delayed. Infrastructure upgrades are deferred.<\/span><\/p>\n<p><span style=\"font-weight: 400\">But unmanaged IT environments become more expensive to fix over time.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Minor technical debt evolves into emergency infrastructure replacements, security incidents, extended downtime, or regulatory penalties.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Proactive oversight through structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/managed-it-services\/\"> <span style=\"font-weight: 400\">managed IT services<\/span><\/a><span style=\"font-weight: 400\"> costs far less than reactive crisis management.<\/span><\/p>\n<h2><b>The Talent and Resource Gap<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many growing businesses lack a dedicated internal IT department. Technology oversight is often handled by a multitasking employee or reactive vendor.<\/span><\/p>\n<p><span style=\"font-weight: 400\">While this may address surface-level issues, it rarely delivers strategic planning, centralized documentation, ongoing monitoring, or structured<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-support\/\"> <span style=\"font-weight: 400\">IT support services<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Technology today requires forward-looking planning aligned with secure<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/it-services-it-procurement\/\"> <span style=\"font-weight: 400\">IT procurement strategies<\/span><\/a><span style=\"font-weight: 400\"> and evolving threat landscapes.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without structured oversight, organizations operate with partial visibility.<\/span><\/p>\n<p><img decoding=\"async\" class=\" wp-image-908 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/12-1024x535.png\" alt=\"\" width=\"857\" height=\"448\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/12-1024x535.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/12-300x157.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/12-768x401.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/03\/12.png 1200w\" sizes=\"(max-width: 857px) 100vw, 857px\" \/><\/p>\n<h2><b>What a Healthy IT Environment Actually Looks Like<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Organizations that overcome hidden technology risk share common characteristics:<\/span><\/p>\n<h3><b>Proactive Maintenance<\/b><\/h3>\n<h3><b><\/b><span style=\"font-weight: 400\">Defined schedules for updates and health checks.<\/span><\/h3>\n<h3><b>Centralized Visibility<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Logs and alerts reviewed not just stored.<\/span><\/p>\n<h3><b>Structured Access Controls<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Permissions documented and reviewed.<\/span><\/p>\n<h3><b>Reliable Backup Planning<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Tested recovery aligned with continuity goals.<\/span><\/p>\n<h3><b>Clear Documentation<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Systems and processes recorded and accessible.<\/span><\/p>\n<h3><b>Strategic Alignment<\/b><\/h3>\n<p><span style=\"font-weight: 400\">Technology decisions informed by evolving risks, including emerging patterns discussed in<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/blog\/top-cybersecurity-trends-greenville-smbs-should-watch-in-2026\/\"> <span style=\"font-weight: 400\">cybersecurity trends for 2026<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Healthy IT is predictable, measurable, and defensible.<\/span><\/p>\n<h2><b>The Business Impact of Ignoring the Problem<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When weaknesses remain unaddressed, organizations face:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Increased cyber exposure.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Higher downtime probability.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Lower employee productivity.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Slower scaling during growth.<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Audit stress and vendor scrutiny.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The most damaging impact isn\u2019t always financial\u2014it\u2019s uncertainty.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If leadership cannot confidently answer:<\/span><\/p>\n<p><span style=\"font-weight: 400\">Are we fully patched?<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Who has access to sensitive data?<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Are backups validated?<\/span><span style=\"font-weight: 400\"><br \/>\n<\/span><span style=\"font-weight: 400\">Are we audit-ready?<\/span><\/p>\n<p><span style=\"font-weight: 400\">There\u2019s a deeper structural issue.<\/span><\/p>\n<h2><b>How CMIT Solutions of Greenville and West Helps Address the Problem<\/b><\/h2>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Greenville and West, the goal isn\u2019t simply to respond to issues. It\u2019s to build stable, structured environments that prevent risk from accumulating.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Through comprehensive<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/managed-it-services\/\"> <span style=\"font-weight: 400\">managed IT support services<\/span><\/a><span style=\"font-weight: 400\">, businesses gain:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Consistent patch management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Centralized monitoring<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strengthened access governance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing documentation<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Risk assessments aligned with compliance standards<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security frameworks built for long-term resilience<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Instead of reacting to disruption, organizations gain measurable oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Technology becomes a foundation\u2014not a vulnerability.<\/span><\/p>\n<h2><b>Moving From Denial to Control<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Admitting your IT environment needs improvement isn\u2019t a weakness\u2014it\u2019s leadership.<\/span><\/p>\n<p><span style=\"font-weight: 400\">As systems expand and threats evolve, unmanaged complexity grows quietly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Businesses that thrive don\u2019t avoid these realities.<\/span><\/p>\n<p><span style=\"font-weight: 400\">They confront them early and implement structured controls that reduce exposure.<\/span><\/p>\n<h2><b>Conclusion: The Problem You Don\u2019t Address Becomes the Risk You Carry<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The technology problem no one wants to admit isn\u2019t outdated hardware or slow internet.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s unmanaged complexity, silent security gaps, and reactive oversight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If your organization relies on \u201cit seems fine\u201d instead of measurable visibility, there\u2019s an opportunity to strengthen your operational foundation.<\/span><\/p>\n<p><span style=\"font-weight: 400\">CMIT Solutions of Greenville and West helps businesses transition from reactive IT environments to structured, proactive systems designed for long-term stability, security, and compliance.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The businesses that stay ahead aren\u2019t the ones that wait for disruption. They\u2019re the ones that evaluate their technology posture before small gaps become major liabilities.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If you\u2019re ready to strengthen your IT foundation and reduce hidden risk, schedule a proactive IT assessment through our<\/span><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"> <span style=\"font-weight: 400\">Greenville IT consultation<\/span><\/a><span style=\"font-weight: 400\"> and start building a more resilient environment today.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Because the most dangerous technology problem isn\u2019t the one you can see.<\/span><\/p>\n<p><span style=\"font-weight: 400\">It\u2019s the one you assume you don\u2019t have.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/contact-us\/\"><img decoding=\"async\" class=\"size-large wp-image-764 aligncenter\" src=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-1024x256.png 1024w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-300x75.png 300w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-768x192.png 768w, https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-content\/uploads\/sites\/157\/2026\/02\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Most business owners are comfortable talking about growth strategies, revenue targets, hiring&#8230;<\/p>\n","protected":false},"author":212,"featured_media":906,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[26,44,22,45,32,19,27,18,15,43],"class_list":["post-905","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-24-7-it-support-greenville","tag-bottlenecks","tag-business-it-support-greenville","tag-compliance-and-documentation-weaknesses","tag-compliance-it-services-greenville","tag-cybersecurity-services-greenville","tag-cybersecurity-solutions-for-businesses-in-greenville","tag-it-services-greenville","tag-greenville","tag-security"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/905","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/users\/212"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/comments?post=905"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/posts\/905\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media\/906"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/media?parent=905"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/categories?post=905"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/greenville-sc-1006\/wp-json\/wp\/v2\/tags?post=905"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}