{"id":759,"date":"2026-04-01T05:59:10","date_gmt":"2026-04-01T10:59:10","guid":{"rendered":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/?p=759"},"modified":"2026-04-01T06:07:46","modified_gmt":"2026-04-01T11:07:46","slug":"ai-is-transforming-engineering-and-industrial-operations-but-only-if-you-secure-it-first","status":"publish","type":"post","link":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/blog\/ai-is-transforming-engineering-and-industrial-operations-but-only-if-you-secure-it-first\/","title":{"rendered":"AI Is Transforming Engineering and Industrial Operations\u2014But Only If You Secure It First"},"content":{"rendered":"<p><em>A $25 million deepfake heist. Ransomware shutting down a major European port. Supply chain attacks compromising thousands of cloud environments. These aren&#8217;t hypothetical scenarios\u2014they happened this month. Here&#8217;s what Pittsburgh-area engineering, manufacturing, and energy firms need to know before deploying AI in 2026.<\/em><\/p>\n<p>\ud83d\udd508-minute read | Applies to: Engineering, Manufacturing, Oil &amp; Gas, Underground Gas Storage<\/p>\n<h2>The AI Opportunity Is Real\u2014So Are the Threats<\/h2>\n<p><strong>Let&#8217;s skip the hype. <\/strong>If you&#8217;re running an engineering firm, a manufacturing operation, or managing underground gas storage facilities in Pennsylvania or the greater Pittsburgh region, you already know that AI can automate repetitive analysis, accelerate project delivery, and reduce costs. What&#8217;s less discussed\u2014and far more urgent\u2014is that <strong>cybercriminals are weaponizing the same AI technology to attack businesses exactly like yours.<\/strong><\/p>\n<p>\ud83d\udcca <strong>68% of organizations reported an increase in AI-powered cyberattacks in 2025, with SMBs being disproportionately targeted.<\/strong><em> \u2014 Barracuda Networks Threat Report<\/em><\/p>\n<p>Earlier this month, Shield and Fortify reported on a stunning case: scammers used AI-generated deepfake video calls\u2014cloning the faces and voices of a CFO and multiple employees\u2014to trick a finance worker into wiring $25 million. Every person on the call looked and sounded real. None of them were. This isn&#8217;t science fiction. It&#8217;s the current threat landscape.<\/p>\n<p>Meanwhile, the SANS Institute&#8217;s March 2026 NewsBites reported that a supply chain compromise of the popular security scanner Trivy rippled through over 1,000 cloud environments, and ransomware shut down operations at Spain&#8217;s Port of Vigo\u2014disrupting logistics for an entire region.<\/p>\n<p>\u26a1<em>Key takeaway: AI adoption without a security-first framework isn&#8217;t innovation\u2014it&#8217;s exposure.<\/em><\/p>\n<h2>What This Means for Engineering, Manufacturing, and Energy Firms<\/h2>\n<h3>Engineering Firms: Protecting Intellectual Property in an AI-Driven Workflow<\/h3>\n<p>Your designs, structural calculations, and client project data are high-value targets. AI tools can dramatically accelerate CAD review, automate structural analysis verification, and generate bid proposals in a fraction of the time\u2014but every AI integration point is also a potential data leakage point.<\/p>\n<p><strong>The risk: <\/strong>Free or consumer-grade AI tools often include terms of service that allow your input data to be used for model training. An engineer who pastes proprietary specifications into a public AI chatbot may have just made your competitive advantage available to the world.<\/p>\n<p><strong>The fix: <\/strong>Deploy enterprise-grade, closed AI environments where data never leaves your control. Establish an Acceptable Use Policy that specifies exactly which tools are approved and what data classifications can interact with AI systems.<\/p>\n<h3>Manufacturing: AI-Powered Predictive Maintenance Meets Operational Security<\/h3>\n<p>Pittsburgh-area manufacturers are already leveraging AI for predictive maintenance\u2014sensors monitoring equipment health, algorithms predicting failures before they cause downtime. The operational gains are significant: reduced unplanned shutdowns, optimized spare parts inventory, and extended equipment life.<\/p>\n<p><strong>But here&#8217;s the vulnerability: <\/strong>Those same IoT sensors and AI endpoints are attack surfaces. Bleeping Computer and Cybersecurity Insiders have documented a sharp increase in attacks targeting industrial IoT and operational technology (OT) systems. A compromised sensor feed could trigger unnecessary shutdowns, mask genuine failures, or serve as a lateral entry point into your broader network.<\/p>\n<p>\ud83d\udcca <strong>Ransomware attacks on manufacturing increased 87% year-over-year, making it the most-targeted sector in 2025.<\/strong><em> \u2014 Cybersecurity Insiders<\/em><\/p>\n<h3>Oil &amp; Gas and Underground Gas Storage: Compliance, Safety, and Cyber Resilience<\/h3>\n<p>For operators managing underground natural gas storage (UGS) facilities, the stakes are uniquely high. PHMSA&#8217;s regulatory framework mandates rigorous safety protocols, and the American Gas Association (AGA) continues to advocate for infrastructure modernization that balances operational reliability with security.<\/p>\n<p>AI applications in this sector\u2014predictive analytics for well integrity monitoring, automated leak detection, and compliance reporting\u2014are transformative. But they also introduce new compliance considerations. PHMSA inspectors are increasingly scrutinizing how digital systems interact with safety-critical infrastructure.<\/p>\n<p><strong>Industry insight: <\/strong>AGA&#8217;s 2026 priorities emphasize that energy infrastructure modernization must include cybersecurity as a foundational element, not an afterthought. Their recent advocacy for the SPEED Act underscores that permitting and infrastructure development go hand-in-hand with security standards.<\/p>\n<p>\u26a1<em>If your UGS operation uses AI for monitoring or compliance, ask: Is this system air-gapped from your corporate network? Who has API access? How are anomalies validated?<\/em><\/p>\n<h2>Building a Security-First AI Framework: A Practical Guide<\/h2>\n<p>At CMIT Solutions of Pittsburgh North, we don&#8217;t just recommend AI adoption\u2014we architect it securely. Here&#8217;s the framework we use with our clients across engineering, manufacturing, and energy:<\/p>\n<h3>Step 1: Assess and Classify Your Data<\/h3>\n<p>Before any AI tool touches your systems, categorize your data by sensitivity level:<\/p>\n<ul>\n<li><strong>Public: <\/strong>Marketing materials, general company information<\/li>\n<li><strong>Internal: <\/strong>Operational data, non-sensitive project information<\/li>\n<li><strong>Confidential: <\/strong>Client specifications, proprietary designs, bid pricing<\/li>\n<li><strong>Restricted: <\/strong>Safety-critical data, PHMSA compliance records, financial data<\/li>\n<\/ul>\n<p><strong>Rule: Confidential and Restricted data should never interact with public AI models. Period.<\/strong><\/p>\n<h3>Step 2: Vet Every AI Tool Before Deployment<\/h3>\n<p>Use this checklist for every AI application your team wants to adopt:<\/p>\n<ul>\n<li>Does the vendor guarantee that your data will NOT be used for model training?<\/li>\n<li>Is end-to-end encryption provided for data in transit and at rest?<\/li>\n<li>Does it comply with your industry&#8217;s regulatory requirements (PHMSA, ITAR, NIST)?<\/li>\n<li>Can it integrate with your existing endpoint detection and response (EDR) system?<\/li>\n<li>Is there an audit trail for all AI-generated outputs and decisions?<\/li>\n<li>What is the vendor&#8217;s incident response SLA?<\/li>\n<\/ul>\n<h3>Step 3: Start with &#8216;Crawl&#8217; Before You &#8216;Run&#8217;<\/h3>\n<p>We recommend a phased approach:<\/p>\n<ul>\n<li><strong>Crawl (Weeks 1\u20134): <\/strong>Enable AI features already built into your existing software stack\u2014Microsoft Copilot, automated meeting summaries, basic document drafting. Low risk, immediate time savings.<\/li>\n<li><strong>Walk (Months 2\u20133): <\/strong>Introduce AI-assisted workflows: automated CAD review flagging, predictive maintenance dashboards, AI-generated compliance report drafts. Each integration gets a security review.<\/li>\n<li><strong>Run (Month 4+): <\/strong>Full-scale deployment of custom AI workflows: automated bid generation, real-time equipment health monitoring with AI-driven decision support, AI-enhanced cybersecurity monitoring.<\/li>\n<\/ul>\n<h3>Step 4: Train Your People\u2014They&#8217;re Your First Line of Defense<\/h3>\n<p>The $25 million deepfake heist succeeded because a human trusted what they saw on screen. Your team needs to know:<\/p>\n<ul>\n<li>How to verify identity on video calls (use out-of-band confirmation for financial decisions)<\/li>\n<li>How to recognize AI-generated phishing emails (which now have perfect grammar and context-aware personalization)<\/li>\n<li>What data they can and cannot share with AI tools<\/li>\n<li>How to report suspicious AI-generated content<\/li>\n<\/ul>\n<h2>AI Use Cases That Deliver ROI\u2014Securely<\/h2>\n<p>Here&#8217;s where the rubber meets the road. These are AI applications our clients are deploying right now, with measurable results:<\/p>\n<table width=\"575\" cellspacing=\"0\" cellpadding=\"7\">\n<tbody>\n<tr valign=\"top\">\n<td style=\"border-top: 1.00pt solid #4f81bd;border-bottom: 2.25pt solid #4f81bd;border-left: 1.00pt solid #4f81bd;border-right: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Application<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"border-top: 1.00pt solid #4f81bd;border-bottom: 2.25pt solid #4f81bd;border-left: 1.00pt solid #4f81bd;border-right: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Industry<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"border-top: 1.00pt solid #4f81bd;border-bottom: 2.25pt solid #4f81bd;border-left: 1.00pt solid #4f81bd;border-right: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Time Saved<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"border-top: 1.00pt solid #4f81bd;border-bottom: 2.25pt solid #4f81bd;border-left: 1.00pt solid #4f81bd;border-right: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Security Consideration<\/span><\/strong><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Automated bid proposal drafting<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Engineering<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">12+ hrs\/week<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Closed AI model; no external data sharing<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Predictive maintenance alerts<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Manufacturing<\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">30% less downtime<\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Air-gapped sensor networks; validated feeds<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Compliance report generation<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Oil &amp; Gas \/ UGS<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">8 hrs\/month<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">PHMSA-aligned data handling; audit trail<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Network anomaly detection<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">All<\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">24\/7 monitoring<\/span><\/span><\/p>\n<\/td>\n<td style=\"border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Integrated with EDR; SOC-reviewed alerts<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<tr valign=\"top\">\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><strong><span style=\"font-family: Aptos, serif\">Meeting summarization &amp; action items<\/span><\/strong><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">All<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"130\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">3+ hrs\/week<\/span><\/span><\/p>\n<\/td>\n<td style=\"background: #d3dfee;border: 1.00pt solid #4f81bd;padding: 0cm 0.19cm\" bgcolor=\"#d3dfee\" width=\"129\">\n<p class=\"western\" align=\"left\"><span style=\"font-size: medium\"><span style=\"font-family: Aptos, serif\">Enterprise-grade; data stays in-tenant<\/span><\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>This Month in Cybersecurity: What You Need to Know<\/h2>\n<p>Staying informed isn&#8217;t optional\u2014it&#8217;s operational. Here are the developments from March 2026 that directly affect your business:<\/p>\n<ul>\n<li><strong>Trivy Supply Chain Compromise (SANS NewsBites, March 27, 2026): <\/strong>A popular open-source security scanner was itself compromised, spreading infostealers across 1,000+ cloud environments. If your DevOps or engineering teams use open-source tools, verify your supply chain integrity immediately.<\/li>\n<li><strong>FCC Bans Foreign-Made Routers (March 23, 2026): <\/strong>All routers manufactured outside the United States have been designated as posing &#8216;unacceptable national security risk.&#8217; Inventory your network hardware and plan replacements. This directly affects industrial networks and remote sites.<\/li>\n<li><strong>Ransomware Disrupts Port of Vigo, Spain (March 24, 2026): <\/strong>Critical logistics and scheduling systems were knocked offline. Manufacturing and energy companies dependent on port logistics take note: your supply chain partners&#8217; cybersecurity posture is your risk too.<\/li>\n<li><strong>AI Deepfake Scams Escalate (Shield &amp; Fortify): <\/strong>Multi-person deepfake video calls are now being used for financial fraud at scale. Implement verification protocols for any financial transaction initiated via video or voice communication.<\/li>\n<\/ul>\n<p>\u26a1<em>We track these threats continuously so you don&#8217;t have to. As your managed IT partner, CMIT Solutions of Pittsburgh North delivers proactive threat intelligence as part of our service\u2014not as an upsell.<\/em><\/p>\n<h2>Is Your Infrastructure AI-Ready? An Honest Assessment<\/h2>\n<p>Outdated infrastructure is the single biggest barrier to successful AI adoption. Here&#8217;s what &#8216;AI-ready&#8217; actually means for industrial and engineering environments:<\/p>\n<ul>\n<li><strong>Network bandwidth: <\/strong>AI cloud services require consistent, low-latency connectivity. If your team experiences lag during video calls, your infrastructure isn&#8217;t ready for AI workloads.<\/li>\n<li><strong>Endpoint hardware: <\/strong>Power users running AI-assisted CAD, simulation, or analysis tools need workstations with dedicated GPUs and sufficient RAM. Running 2026 AI on 2018 hardware creates bottlenecks and frustration.<\/li>\n<li><strong>Cloud vs. on-premises: <\/strong>Most AI tools are cloud-delivered (SaaS), but some industries\u2014particularly those handling ITAR-controlled data or PHMSA-regulated information\u2014may require on-premises or hybrid deployments.<\/li>\n<li><strong>Backup and disaster recovery: <\/strong>As AI becomes embedded in your workflows, it must be integrated into your business continuity plan. What happens if your AI-assisted monitoring system goes offline? You need manual fallback procedures and tested recovery protocols.<\/li>\n<li><strong>Cyber insurance: <\/strong>Insurers are increasingly evaluating AI governance when underwriting policies. A documented security-first AI framework strengthens your insurability and may reduce premiums.<\/li>\n<\/ul>\n<h2>Frequently Asked Questions<\/h2>\n<p><strong>Q: Is AI safe for engineering firms handling proprietary designs?<\/strong><\/p>\n<p>A: AI is safe when deployed in controlled environments with strict data governance, encryption, and access controls. Enterprise-grade tools that guarantee data isolation are strongly recommended. Public or free AI platforms should be prohibited for any work involving client specifications, proprietary methods, or bid-sensitive information.<\/p>\n<p><strong>Q: How much does AI adoption cost for a small or mid-sized firm?<\/strong><\/p>\n<p>A: Many AI capabilities are now available through SaaS models starting at $20\u201350\/user\/month\u2014often embedded in tools you already pay for (e.g., Microsoft 365 Copilot). The real cost isn&#8217;t the software; it&#8217;s the security architecture, training, and change management required to deploy it responsibly. That&#8217;s where a managed IT partner delivers value.<\/p>\n<p><strong>Q: What is the &#8216;Crawl-Walk-Run&#8217; approach?<\/strong><\/p>\n<p>A: It&#8217;s a phased adoption strategy: start with low-risk automations (crawl), advance to integrated workflows with security reviews (walk), and then deploy full-scale AI-driven operations (run). This approach prevents data overload, reduces risk, and ensures your team adapts safely.<\/p>\n<p><strong>Q: Do we need a managed IT provider to adopt AI?<\/strong><\/p>\n<p>A: You need one to adopt it securely. AI adds complexity to your cybersecurity posture, network architecture, and compliance requirements. A managed provider ensures your infrastructure can handle AI workloads while maintaining defense-in-depth against evolving threats\u2014including AI-powered attacks.<\/p>\n<p><strong>Q: How do AI regulations affect oil &amp; gas and underground gas storage operations?<\/strong><\/p>\n<p>A: PHMSA&#8217;s regulatory framework doesn&#8217;t yet specifically address AI, but any digital system that interacts with safety-critical infrastructure falls under existing safety management requirements. Documenting your AI governance framework proactively positions you ahead of inevitable regulatory updates.<\/p>\n<h2>Your Next Move: 15 Minutes That Could Save Your Business<\/h2>\n<p>The gap between AI-enabled firms and those still deliberating is widening every month. Your competitors are already deploying these tools. The question isn&#8217;t whether you&#8217;ll adopt AI\u2014it&#8217;s whether you&#8217;ll do it securely, or learn the hard way.<\/p>\n<p><strong>Schedule a complimentary 15-minute AI Readiness Assessment<\/strong><\/p>\n<p>We&#8217;ll evaluate your current infrastructure, identify the highest-ROI AI opportunities for your specific industry, and outline a security-first adoption roadmap\u2014tailored to engineering, manufacturing, or energy operations.<\/p>\n<p>\ud83d\udcdeCall us: (412) 358-0100 | \ud83c\udf10 cmitsolutions.com\/pittsburghnorth | \ud83d\udce7 Email: info.pittnorth@cmitsolutions.com<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A $25 million deepfake heist. Ransomware shutting down a major European port&#8230;.<\/p>\n","protected":false},"author":298,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-759","post","type-post","status-publish","format-standard","hentry","category-local-it"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/posts\/759","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/users\/298"}],"replies":[{"embeddable":true,"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/comments?post=759"}],"version-history":[{"count":0,"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/posts\/759\/revisions"}],"wp:attachment":[{"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/media?parent=759"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/categories?post=759"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cmitsolutions.com\/pittsburgh-pa-1171\/wp-json\/wp\/v2\/tags?post=759"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}