{"id":1058,"date":"2025-06-20T04:57:27","date_gmt":"2025-06-20T09:57:27","guid":{"rendered":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/?p=1058"},"modified":"2025-06-16T05:13:18","modified_gmt":"2025-06-16T10:13:18","slug":"endpoint-security-in-a-remote-world-what-smbs-are-still-missing","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/endpoint-security-in-a-remote-world-what-smbs-are-still-missing\/","title":{"rendered":"Endpoint Security in a Remote World: What SMBs Are Still Missing"},"content":{"rendered":"<h2><b>Introduction: The Remote Shift and the Security Void<\/b><\/h2>\n<p><span style=\"font-weight: 400\">When the world transitioned to remote and hybrid work models seemingly overnight, small and medium-sized businesses (SMBs) found themselves facing both opportunity and risk. While virtual collaboration offered new agility, it also exposed vast vulnerabilities in endpoint security. Laptops, smartphones, tablets, and even smart home networks connected to corporate systems became new threat vectors overnight.<\/span><\/p>\n<p><span style=\"font-weight: 400\">For SMBs in regions like Long Beach, where innovation and entrepreneurship thrive, the urgency to adapt has been immense. But many are still lagging behind. Cybercriminals, ever adaptive, now target SMBs more than ever before because they tend to lack robust IT defenses.<\/span><\/p>\n<h2><b>The Critical Role of Endpoint Security<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Endpoint security is no longer optional. Every device connecting to your business network is a potential doorway for attackers. In a decentralized work environment, unprotected endpoints become weak links that can compromise sensitive business data, customer records, and compliance posture.<\/span><\/p>\n<p><span style=\"font-weight: 400\">However, endpoint protection isn&#8217;t just about antivirus software anymore. It&#8217;s a dynamic, evolving ecosystem that integrates artificial intelligence (AI), threat detection, real-time response, and compliance safeguards. As<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/cyber-threats-in-long-beach-why-small-businesses-are-the-new-target\/\"> <span style=\"font-weight: 400\">cyber threats in Long Beach<\/span><\/a><span style=\"font-weight: 400\"> continue to rise, businesses need a new mindset, one that sees endpoint security as a business enabler, not just an IT checkbox.<\/span><\/p>\n<h2><b>The Evolving Threat Landscape for SMBs<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Threat actors now employ ransomware, phishing-as-a-service, AI-driven social engineering, and zero-day exploits. For SMBs, a single breach can mean total shutdown. The 2024 data reveals that over 60% of SMBs hit by a cyberattack close within six months. Alarmingly, many of these attacks begin with a compromised endpoint.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In Long Beach, where industries like healthcare, logistics, retail, and tech startups flourish, the need to understand modern threats is paramount.<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/cyberattack-wake-up-call-what-long-beach-companies-can-learn-from-major-data-breaches\/\"> <span style=\"font-weight: 400\">Cyberattack wake-up calls<\/span><\/a><span style=\"font-weight: 400\"> have already served as harsh lessons for many. But instead of reacting post-incident, proactive planning can make all the difference.<\/span><\/p>\n<h2><b>Why Legacy Security Fails in a Remote Environment<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Traditional on-premise security models centered on firewalls and perimeter defenses fall short in a remote-first world. Once endpoints operate outside the company\u2019s secured network, older tools lose visibility and control. This blind spot is what many attackers exploit.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Additionally, remote teams often rely on public Wi-Fi, personal devices, and unencrypted applications, further weakening endpoint defense. SMBs using outdated antivirus programs, weak passwords, or non-managed tools are especially vulnerable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To mitigate these risks, adopting managed solutions like<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/ai-security-for-long-beach-businesses-how-to-choose-the-right-solution-to-stay-protected\/\"> <span style=\"font-weight: 400\">AI security for Long Beach businesses<\/span><\/a><span style=\"font-weight: 400\"> has become essential.<\/span><\/p>\n<p><img decoding=\"async\" class=\"size-large wp-image-1060 aligncenter\" src=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/06\/Copy-of-cmit-boise-featured-image-87-1024x535.png\" alt=\"\" width=\"1024\" height=\"535\" srcset=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/06\/Copy-of-cmit-boise-featured-image-87-1024x535.png 1024w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/06\/Copy-of-cmit-boise-featured-image-87-300x157.png 300w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/06\/Copy-of-cmit-boise-featured-image-87-768x401.png 768w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/06\/Copy-of-cmit-boise-featured-image-87.png 1200w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<h2><b>What SMBs Are Still Missing<\/b><\/h2>\n<p><span style=\"font-weight: 400\">While awareness has grown, key gaps remain. Here are areas where most SMBs fall short:<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400\"><b>Unified Device Management<\/b><span style=\"font-weight: 400\">: Too many companies lack centralized visibility into who is accessing what data, from which device, and from where. Without endpoint visibility, detection becomes reactionary.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Zero Trust Architecture<\/b><span style=\"font-weight: 400\">: SMBs often still use trust-based access controls, where authenticated users are assumed secure. Zero Trust requires ongoing verification of identity and device hygiene before granting access.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Patch Management<\/b><span style=\"font-weight: 400\">: Delayed or inconsistent software updates create known vulnerabilities. Many SMBs don&#8217;t have an automated system to ensure all devices are current.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Employee Training<\/b><span style=\"font-weight: 400\">: Human error remains the biggest risk. Despite this, cybersecurity training is often one-and-done. Modern training must be continuous, gamified, and relevant to the current threat landscape.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Cloud Misconfigurations<\/b><span style=\"font-weight: 400\">: With the rise of hybrid work, cloud usage has surged. However, misconfigured settings, especially on shared platforms, expose endpoints.<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/cloud-security-meets-flexibility-why-long-beach-businesses-are-moving-to-managed-cloud-services\/\"> <span style=\"font-weight: 400\">Cloud security and flexibility<\/span><\/a><span style=\"font-weight: 400\"> must go hand in hand.<\/span><\/li>\n<li style=\"font-weight: 400\"><b>Lack of EDR &amp; MDR Tools<\/b><span style=\"font-weight: 400\">: Endpoint Detection and Response (EDR) and Managed Detection and Response (MDR) tools allow real-time monitoring and mitigation of threats. Many Long Beach SMBs still rely on reactive systems rather than<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/understanding-mdr-edr-and-siem-which-cybersecurity-solution-fits-your-long-beach-business\/\"> <span style=\"font-weight: 400\">intelligent cybersecurity solutions<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/li>\n<\/ol>\n<h2><b>Harnessing AI for Smarter Endpoint Security<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Artificial Intelligence has emerged as a game-changer in endpoint defense. Tools now analyze behavioral data to identify anomalies, flag suspicious patterns, and trigger automated containment.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Solutions that integrate AI can preemptively stop threats before they escalate. For example, AI can detect if a user\u2019s behavior differs from their normal pattern and immediately restrict access or escalate for review.<\/span><\/p>\n<p><span style=\"font-weight: 400\">SMBs leveraging<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/ai-is-reshaping-long-beach-businesses-unlocking-efficiency-insight-and-innovation\/\"> <span style=\"font-weight: 400\">AI innovation in Long Beach<\/span><\/a><span style=\"font-weight: 400\"> are already seeing reduced incident response times and better threat containment.<\/span><\/p>\n<h2><b>The Role of Managed Services in Closing the Gaps<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many SMBs lack in-house resources to manage 24\/7 monitoring, patch updates, and incident response. This is where<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/transforming-it-support-in-long-beach-how-managed-services-are-leading-the-way\/\"> <span style=\"font-weight: 400\">managed IT support in Long Beach<\/span><\/a><span style=\"font-weight: 400\"> proves invaluable. Managed Service Providers (MSPs) offer scalable, expert-led endpoint protection, often with flat-rate pricing models.<\/span><\/p>\n<p><span style=\"font-weight: 400\">MSPs implement best-in-class practices, perform audits, ensure compliance, and integrate endpoint solutions that evolve with the threat landscape.<\/span><\/p>\n<h2><b>Importance of Network Visibility<\/b><\/h2>\n<p><span style=\"font-weight: 400\">No endpoint security strategy can succeed without complete network visibility. SMBs must know which devices are connected, whether they are updated, and what files or systems they interact with.<\/span><\/p>\n<p><span style=\"font-weight: 400\">With<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/network-management-in-long-beach-why-its-a-must-have-for-reliable-business-operations\/\"> <span style=\"font-weight: 400\">network management in Long Beach<\/span><\/a><span style=\"font-weight: 400\">, SMBs can enforce access policies, segment risky users, and receive alerts when something unusual occurs.<\/span><\/p>\n<h2><b>Strengthening Authentication and Access Control<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Passwords alone are no longer sufficient. Many breaches begin with compromised credentials. Moving to<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/passkeys-vs-passwords-a-smarter-safer-approach-for-long-beach-cybersecurity\/\"> <span style=\"font-weight: 400\">passkeys and stronger authentication<\/span><\/a><span style=\"font-weight: 400\"> mechanisms can drastically reduce exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Multi-factor authentication (MFA), biometrics, device certificates, and session-based authorization must be part of every endpoint security plan.<\/span><\/p>\n<h2><b>Cloud Endpoint Integration<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Remote environments often depend on cloud-hosted applications and storage. Without endpoint-level encryption and monitoring, data leakage becomes a real concern.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/why-cloud-backups-are-essential-for-long-beach-businesses-protecting-your-critical-data\/\"><span style=\"font-weight: 400\">Cloud backups and recovery<\/span><\/a><span style=\"font-weight: 400\"> offer an essential layer of protection, ensuring data can be restored even if devices are compromised.<\/span><\/p>\n<h2><b>Compliance Considerations<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Industries like healthcare, finance, and legal services must maintain strict data compliance. In remote work settings, maintaining<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/hipaa-and-beyond-building-a-strong-compliance-strategy-for-long-beach-healthcare-providers\/\"> <span style=\"font-weight: 400\">HIPAA and compliance<\/span><\/a><span style=\"font-weight: 400\"> mandates gets harder. Encryption, access logs, secure storage, and continuous risk assessments become non-negotiable.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/smart-secure-and-scalable-how-cmit-solutions-of-long-beach-supports-healthcare-it-needs\/\"><span style=\"font-weight: 400\">Long Beach healthcare providers<\/span><\/a><span style=\"font-weight: 400\">, in particular, must adhere to heightened security and privacy regulations. Endpoint protection tailored to these needs is essential.<\/span><\/p>\n<h2><b>Building a Culture of Cybersecurity<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Endpoint security isn\u2019t just a technical challenge; it\u2019s cultural. SMBs must embed cybersecurity into every department\u2019s daily habits. From leadership to interns, everyone should understand their role in maintaining endpoint hygiene.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cyber resilience grows stronger when security becomes a shared responsibility. Leadership must champion this effort, reinforcing protocols and incentivizing compliance.<\/span><\/p>\n<h2><b>Strategic Recommendations for SMBs<\/b><\/h2>\n<p><span style=\"font-weight: 400\">To ensure robust endpoint protection in today\u2019s remote-first landscape, Long Beach businesses should prioritize:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Deploying AI-powered endpoint protection platforms<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Partnering with MSPs for<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/driving-growth-in-long-beach-how-smart-technology-fuels-business-expansion\/\"> <span style=\"font-weight: 400\">comprehensive IT support<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Implementing Zero Trust frameworks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conducting quarterly security training and simulated phishing attacks<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ensuring<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/the-digital-shift-in-healthcare-why-clinics-and-practices-need-a-trusted-msp-partner\/\"> <span style=\"font-weight: 400\">regular data backups to the cloud<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Conducting endpoint audits every 30 days<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Creating BYOD (Bring Your Own Device) policies<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Adopting strong access control and<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/cybersecurity-without-compromise-how-cmit-solutions-of-long-beach-shields-your-business-from-modern-threats\/\"> <span style=\"font-weight: 400\">identity authentication protocols<\/span><\/a><\/li>\n<\/ul>\n<h2><b>Future Outlook: Remote Work Is Here to Stay<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Remote and hybrid work are not temporary. They are the future of work. SMBs in Long Beach must view this shift not as a disruption but as an opportunity to reinvent their IT frameworks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Those who invest in endpoint security today will be better prepared to scale, adapt, and survive whatever threats tomorrow may bring.<\/span><\/p>\n<h2><b>Incorporating AI, Compliance, and Unified Tools<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Cybersecurity strategies must go beyond piecemeal solutions. Integrating AI, EDR, and secure communications into a single pane of glass simplifies management.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Tools that offer<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/unified-communications-for-the-win-powering-remote-and-in-office-teams-with-seamless-collaboration-tools\/\"> <span style=\"font-weight: 400\">unified communications<\/span><\/a><span style=\"font-weight: 400\">, endpoint visibility, and intelligent alerting allow IT teams to respond faster, prevent breaches, and reduce fatigue from alert overload.<\/span><\/p>\n<h2><b>How CMIT Solutions of Long Beach Can Help<\/b><\/h2>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Long Beach, we specialize in securing endpoints across complex environments. From mobile teams to hybrid healthcare setups, our customized services offer:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">AI-driven threat detection<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Secure cloud infrastructure<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Real-time response to threats<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Full compliance management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strategic IT consulting<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400\">Whether you&#8217;re navigating compliance with healthcare regulations or building an agile remote-first infrastructure, we bring local expertise and enterprise-grade solutions to the table.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Explore how we&#8217;re<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/preventing-data-breaches-with-ai-how-long-beach-small-businesses-can-stay-one-step-ahead\/\"> <span style=\"font-weight: 400\">preventing data breaches with AI<\/span><\/a><span style=\"font-weight: 400\"> and helping clients stay ahead of the curve with tools like<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/choosing-the-right-asp-partner-simplifying-application-hosting-for-long-beach-businesses\/\"> <span style=\"font-weight: 400\">unified endpoint protection<\/span><\/a><span style=\"font-weight: 400\">,<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/ai-innovation-in-long-beach-how-amds-breakthroughs-are-reshaping-business-technology\/\"> <span style=\"font-weight: 400\">automated patch management<\/span><\/a><span style=\"font-weight: 400\">, and<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/choosing-the-right-asp-partner-simplifying-application-hosting-for-long-beach-businesses\/\"> <span style=\"font-weight: 400\">secure application hosting<\/span><\/a><span style=\"font-weight: 400\">.<\/span><\/p>\n<h2><b>Conclusion: Secure Your Endpoints, Secure Your Future<\/b><\/h2>\n<p><span style=\"font-weight: 400\">In today\u2019s remote-first, cloud-powered world, endpoint security must be a strategic priority. Cyberattacks are growing in frequency and sophistication, and SMBs are no longer off the radar.<\/span><\/p>\n<p><span style=\"font-weight: 400\">To protect business continuity, customer trust, and compliance posture, investing in modern, intelligent, and managed endpoint security is no longer optional\u2014it&#8217;s essential.<\/span><\/p>\n<p><span style=\"font-weight: 400\">CMIT Solutions of Long Beach is your partner in this transformation. Let&#8217;s work together to ensure every device, every user, and every file is protected, no matter where your team works.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Ready to take the next step in securing your endpoints? Contact <\/span><b>CMIT Solutions of Long Beach<\/b><span style=\"font-weight: 400\"> today to schedule a security assessment tailored to your business needs.<\/span><\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/contact-us\/\"><img decoding=\"async\" class=\"size-full wp-image-941 aligncenter\" src=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1.png\" alt=\"\" width=\"1024\" height=\"256\" srcset=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1.png 1024w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1-300x75.png 300w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Introduction: The Remote Shift and the Security Void When the world transitioned&#8230;<\/p>\n","protected":false},"author":1042,"featured_media":1059,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[20,17,16,19,26,25,21,22,24,18],"class_list":["post-1058","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-cloud","tag-cmit-longbeach","tag-cmit-solutions","tag-cybersecurity","tag-it-services-in-longbeach","tag-it-support-in-longbeach","tag-longbeach","tag-longbeach-it-services","tag-longbeach-it-support","tag-managed-it-services"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts\/1058","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/users\/1042"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/comments?post=1058"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts\/1058\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/media\/1059"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/media?parent=1058"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/categories?post=1058"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/tags?post=1058"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}