{"id":1967,"date":"2026-02-25T04:25:56","date_gmt":"2026-02-25T10:25:56","guid":{"rendered":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/?p=1967"},"modified":"2026-02-25T04:25:56","modified_gmt":"2026-02-25T10:25:56","slug":"from-the-owners-desk-michel-abrahams-perspective-on-the-biggest-it-risks-smbs-face-today","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/from-the-owners-desk-michel-abrahams-perspective-on-the-biggest-it-risks-smbs-face-today\/","title":{"rendered":"From the Owner\u2019s Desk: Michel Abraham\u2019s Perspective on the Biggest IT Risks SMBs Face Today"},"content":{"rendered":"<p><span style=\"font-weight: 400\">As the President of CMIT Solutions of Long Beach, I\u2019ve had countless conversations with small and mid-sized business owners who believe their biggest risks are market competition, staffing challenges, or rising costs. While those concerns are valid, there is another category of risk that often goes underestimated until it causes real damage IT risk.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Today\u2019s SMBs rely on technology for nearly every function of their business. That reliance creates opportunity, but it also creates exposure. The most serious IT risks I see are not always dramatic cyberattacks or system failures. More often, they are slow-building issues caused by outdated strategies, fragmented systems, and assumptions that \u201cit won\u2019t happen to us.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">Below are the biggest IT risks SMBs face today, based on what I see every day working directly with business leaders in our community.<\/span><\/p>\n<h2><b>Treating Cybersecurity as an IT Issue Instead of a Business Risk<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the most common mistakes SMBs make is viewing cybersecurity as a technical problem rather than a business risk. When security is delegated solely to IT without executive involvement, critical decisions are often made without understanding their broader impact.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Cyber incidents affect revenue, reputation, operations, and customer trust. When leadership is disconnected from security strategy, businesses are left reactive instead of prepared.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From my perspective, this risk becomes clear when businesses fail to recognize that cybersecurity touches every part of the organization:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Financial stability and operational continuity<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Customer and client trust<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Legal and contractual obligations<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Employee accountability<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Long-term business resilience<\/span><\/li>\n<\/ul>\n<h2><b>Overconfidence in Outdated or Incomplete Security Measures<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many SMBs believe they are protected because they have antivirus software, a firewall, or basic backups. While these tools are important, they are no longer sufficient on their own.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Threats have evolved, but many SMB security strategies have not. Overconfidence in outdated protections creates a false sense of security that leaves businesses exposed.<\/span><\/p>\n<p><span style=\"font-weight: 400\">I often see this risk surface when businesses rely on:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Single-layer security approaches supported by beyond antivirus<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Tools that are not actively monitored supported by understanding MDR, EDR, and SIEM<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Infrequent updates or patching supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/outdated-os-updated-risk-what-happens-when-you-stick-with-windows-10\/\"> <span style=\"font-weight: 400\">outdated OS<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Assumptions that size equals invisibility supported by cyber threats<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack of visibility into real-time threats supported by AI security<\/span><\/li>\n<\/ul>\n<h2><b>Growing IT Complexity Without Strategic Oversight<\/b><\/h2>\n<p><span style=\"font-weight: 400\">As businesses grow, their technology environments often become more complex. New software is added, vendors change, and systems evolve often without a clear strategy guiding those decisions.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This complexity increases the likelihood of misconfigurations, security gaps, and inefficiencies that quietly undermine the business.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From an owner\u2019s perspective, unmanaged complexity becomes a serious risk when:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Systems do not integrate properly supported by cloud sprawl<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">No one has full visibility into the IT environment supported by cybersecurity metrics<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security responsibilities are unclear supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/shadow-it-and-insider-threats-are-your-employees-creating-risk\/\"> <span style=\"font-weight: 400\">shadow IT<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Troubleshooting becomes time-consuming supported by IT downtime<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Costs increase without clear value supported by subscription trap<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1969\" src=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/9-1-1024x535.png\" alt=\"\" width=\"1014\" height=\"530\" srcset=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/9-1-1024x535.png 1024w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/9-1-300x157.png 300w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/9-1-768x401.png 768w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/9-1.png 1200w\" sizes=\"(max-width: 1014px) 100vw, 1014px\" \/><\/p>\n<h2><b>Underestimating the Risk of Human Error<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Technology alone cannot protect a business. Employees interact with systems, data, and communication tools every day, making human behavior one of the most significant risk factors.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Phishing emails, weak passwords, and accidental data sharing remain common entry points for security incidents.<\/span><\/p>\n<p><span style=\"font-weight: 400\">What concerns me most is not mistakes themselves but the lack of preparation that allows those mistakes to cause real harm.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This risk is most apparent when businesses lack:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ongoing security awareness training supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/security-awareness-2-0-how-to-make-cyber-training-stick-for-your-entire-team\/\"> <span style=\"font-weight: 400\">security awareness<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear policies for handling sensitive information supported by digital workplace<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Strong access controls supported by zero trust<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Easy ways to report suspicious activity supported by cyberattack wake-up call<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Leadership reinforcement of security best practices supported by human error<\/span><\/li>\n<\/ul>\n<h2><b>Inadequate Planning for Downtime and Disruptions<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Every business will experience disruption at some point\u2014whether from cyber incidents, system failures, or unexpected events. The risk lies not in the disruption itself, but in being unprepared for it.<\/span><\/p>\n<p><span style=\"font-weight: 400\">I\u2019ve seen SMBs assume backups alone are enough, without considering how quickly systems can be restored or how long operations can realistically be down.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This risk becomes critical when businesses lack:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Tested backup and recovery plans supported by ransomware resilience<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear roles during an incident supported by ransomware recovery<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Defined recovery timelines supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/disaster-recovery-2-0-cloud-native-strategies-for-continuous-operations\/\"> <span style=\"font-weight: 400\">disaster recovery<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Communication plans for staff and clients supported by proactive IT<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Confidence in their ability to resume operations supported by backup is not enough<\/span><\/li>\n<\/ul>\n<h2><b>Remote Work Expanding Access Without Proper Controls<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Remote and hybrid work have become permanent for many SMBs, but access controls have not always kept pace. Employees now access systems from home networks, personal devices, and multiple locations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without strong identity and access management, this flexibility increases exposure.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From what I see, this risk grows when businesses allow:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Password-only remote access supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/from-passwords-to-passkeys-are-you-ready-for-the-next-phase-of-business-authentication\/\"> <span style=\"font-weight: 400\">from passwords to passkeys<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Shared credentials supported by digital identity management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Limited visibility into remote activity supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/remote-access-reinvented-keeping-your-team-secure-from-anywhere\/\"> <span style=\"font-weight: 400\">remote access<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Unmanaged devices accessing systems supported by endpoint security<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Inconsistent access policies supported by shift from VPNs to zero trust<\/span><\/li>\n<\/ul>\n<h2><b>Compliance Risks That Are Easy to Overlook<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Many SMBs assume compliance only applies to large enterprises or regulated industries. In reality, more businesses are affected by data protection, privacy, and contractual security requirements than ever before.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Non-compliance often isn\u2019t intentional\u2014it happens when businesses don\u2019t realize how their technology choices impact obligations.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This risk shows up when businesses lack:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Clear documentation of IT policies supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/it-audits-demystified-turning-compliance-into-a-competitive-advantage\/\"> <span style=\"font-weight: 400\">IT audits<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Consistent access controls supported by managed compliance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Audit-ready reporting supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/compliance-audits-are-getting-stricter-are-you-prepared\/\"> <span style=\"font-weight: 400\">compliance audits<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Awareness of industry expectations supported by cybersecurity compliance<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Alignment between IT and compliance needs supported by compliance puzzle<\/span><\/li>\n<\/ul>\n<h2><b>Relying on Too Many IT Vendors Without Clear Accountability<\/b><\/h2>\n<p><span style=\"font-weight: 400\">Vendor sprawl is a growing issue for SMBs. Multiple vendors managing different pieces of IT often leads to finger-pointing when something goes wrong.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Without a single point of accountability, risks fall through the cracks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From my experience, this becomes a serious issue when:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">No one owns the overall IT strategy supported by your IT provider<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Security responsibilities are fragmented supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/beyond-the-firewall-how-smbs-can-embrace-next-gen-security-tools\/\"> <span style=\"font-weight: 400\">beyond the firewall<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Vendors do not communicate with each other supported by multi-cloud management<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Costs are difficult to track supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/tech-debt-is-growing-heres-how-smbs-can-stop-it-from-slowing-growth\/\"> <span style=\"font-weight: 400\">tech debt<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Issues take longer to resolve supported by managed IT<\/span><\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter  wp-image-1970\" src=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/10-3-1024x535.png\" alt=\"\" width=\"1011\" height=\"528\" srcset=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/10-3-1024x535.png 1024w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/10-3-300x157.png 300w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/10-3-768x401.png 768w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2026\/02\/10-3.png 1200w\" sizes=\"(max-width: 1011px) 100vw, 1011px\" \/><\/p>\n<h2><b>Delaying IT Decisions Until Problems Become Emergencies<\/b><\/h2>\n<p><span style=\"font-weight: 400\">One of the biggest risks I see is hesitation. SMB leaders are busy, and IT decisions often get postponed until something breaks or a security incident occurs.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Unfortunately, emergency decisions are almost always more expensive and disruptive than proactive planning.<\/span><\/p>\n<p><span style=\"font-weight: 400\">This risk is evident when businesses:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Operate in reactive mode supported by transforming IT support<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Delay system upgrades supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/windows-10-support-ends-october-14-why-its-time-to-move-to-windows-11\/\"> <span style=\"font-weight: 400\">windows 10 support ends<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Ignore early warning signs supported by small gaps big breaches<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Lack long-term IT planning supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/179the-2026-technology-roadmap-what-every-smb-should-be-preparing-for8\/\"> <span style=\"font-weight: 400\">2026 technology roadmap<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Make decisions under pressure supported by real threat behind ransomware<\/span><\/li>\n<\/ul>\n<h2><b>Not Treating IT as a Long-Term Investment<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The final risk is viewing IT as a cost center rather than a strategic investment. Businesses that only spend on IT when necessary often struggle to scale, secure operations, or adapt to change.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In contrast, businesses that invest thoughtfully in IT gain stability, efficiency, and confidence.<\/span><\/p>\n<p><span style=\"font-weight: 400\">From the owner\u2019s desk, I see the difference clearly when businesses:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Align IT with business goals supported by driving growth<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Invest in proactive management supported by proactive IT<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Plan for growth and risk supported by future-proofing<\/span><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Measure outcomes, not just costs supported by<\/span><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/blog\/building-a-future-ready-it-roadmap-key-decisions-for-the-next-five-years\/\"> <span style=\"font-weight: 400\">technology roadmap<\/span><\/a><\/li>\n<li style=\"font-weight: 400\"><span style=\"font-weight: 400\">Treat IT as a business enabler supported by Michel Abraham<\/span><\/li>\n<\/ul>\n<h2><b>Final Thoughts from the Owner\u2019s Desk<\/b><\/h2>\n<p><span style=\"font-weight: 400\">The biggest IT risks SMBs face today are not always obvious, and they rarely announce themselves in advance. They develop quietly through assumptions, shortcuts, and deferred decisions until they reach a breaking point.<\/span><\/p>\n<p><span style=\"font-weight: 400\">At CMIT Solutions of Long Beach, my goal is to help business owners identify and reduce these risks before they disrupt operations, damage trust, or limit growth. When IT is approached strategically, it becomes a source of strength rather than uncertainty.<\/span><\/p>\n<p><span style=\"font-weight: 400\">If you\u2019re unsure where your business stands, that uncertainty itself is a sign worth paying attention to. The right conversations and the right guidance can make all the difference.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/contact-us\/\"><img decoding=\"async\" class=\"aligncenter  wp-image-941\" src=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1.png\" alt=\"\" width=\"1008\" height=\"252\" srcset=\"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1.png 1024w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1-300x75.png 300w, https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-content\/uploads\/sites\/234\/2025\/04\/Blue-and-White-Bold-Call-To-Action-LinkedIn-Banner-1200-x-300-px-7-1024x256-1-768x192.png 768w\" sizes=\"(max-width: 1008px) 100vw, 1008px\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As the President of CMIT Solutions of Long Beach, I\u2019ve had countless&#8230;<\/p>\n","protected":false},"author":1042,"featured_media":1968,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[58,34,36,47,53,56,17,16,40,19,26,27,25,22,24,23,18,50,31],"class_list":["post-1967","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-local-it","tag-5g-for-business","tag-ai-business-tools","tag-ai-data-protection","tag-business-authentication","tag-business-continuity-strategy","tag-cloud-first-access","tag-cmit-longbeach","tag-cmit-solutions","tag-cyber-alert-overload","tag-cybersecurity","tag-it-services-in-longbeach","tag-it-skills","tag-it-support-in-longbeach","tag-longbeach-it-services","tag-longbeach-it-support","tag-managed-it-in-longbeach","tag-managed-it-services","tag-network-resilient","tag-tech-upgrade"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts\/1967","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/users\/1042"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/comments?post=1967"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/posts\/1967\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/media\/1968"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/media?parent=1967"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/categories?post=1967"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/long-beach-ca-1217\/wp-json\/wp\/v2\/tags?post=1967"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}