{"id":6,"date":"2026-03-10T14:02:30","date_gmt":"2026-03-10T08:32:30","guid":{"rendered":"https:\/\/cninfoline.com\/blog\/?p=6"},"modified":"2026-03-10T14:08:46","modified_gmt":"2026-03-10T08:38:46","slug":"network-security-tips-small-businesses-india","status":"publish","type":"post","link":"https:\/\/cninfoline.com\/blog\/network-security-tips-small-businesses-india\/","title":{"rendered":"Top 10 Network Security Tips for Small Businesses in India 2026"},"content":{"rendered":"\n<p><em>By CN Infoline | Estimated Read Time: 10 min | Category: Cybersecurity<\/em><\/p>\n\n\n\n<p><strong>India is under cyberattack. <\/strong>According to the Indian Computer Emergency Response Team (CERT-In), India witnessed over 13.91 lakh cybersecurity incidents in 2022 alone \u2014 and small businesses were the primary targets. Why? Because attackers know that small and medium enterprises (SMEs) typically invest the least in cybersecurity, making them the easiest entry point into supply chains, financial networks, and customer databases.<\/p>\n\n\n\n<p>If you run a business in Delhi NCR or anywhere in India and your network is not properly secured, you are not asking IF you will be attacked \u2014 you are asking WHEN. This guide gives you 10 actionable, technically sound network security measures that every small business IT team must implement in 2026.<\/p>\n\n\n\n<p>These recommendations come from our team at <strong>CN Infoline<\/strong>, an RHCE-certified IT infrastructure company based in New Delhi, with over 10 years of hands-on experience deploying enterprise-grade security for businesses across Delhi NCR.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Small Businesses Are High-Value Targets<\/h2>\n\n\n\n<p>Before diving into the tips, it is important to understand the threat landscape specific to Indian SMEs:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Low security budgets \u2014 most SMEs allocate less than 5% of IT budget to security<\/li>\n\n\n\n<li>Unpatched systems \u2014 legacy Windows and Linux servers running outdated kernels<\/li>\n\n\n\n<li>No dedicated security team \u2014 IT generalists managing everything from printers to firewalls<\/li>\n\n\n\n<li>Valuable data \u2014 customer PII, payment data, and business contracts stored without encryption<\/li>\n\n\n\n<li>Third-party access \u2014 vendors and contractors with unchecked network privileges<\/li>\n<\/ul>\n\n\n\n<p>Understanding these attack vectors is step one. Now here are the 10 measures you must put in place.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 1: Deploy a Next-Generation Firewall (NGFW)<\/h2>\n\n\n\n<p>A traditional stateful firewall that simply filters packets based on IP and port numbers is no longer sufficient. In 2026, you need a Next-Generation Firewall that operates at Layer 7 (Application Layer) and provides:<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Deep Packet Inspection (DPI) to inspect encrypted traffic<\/li>\n\n\n\n<li>Intrusion Prevention System (IPS) with signature-based threat detection<\/li>\n\n\n\n<li>Application awareness \u2014 block specific apps like BitTorrent, TikTok, or unauthorized cloud storage<\/li>\n\n\n\n<li>SSL\/TLS inspection to detect malware hidden in HTTPS traffic<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended Solutions for Indian SMEs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Fortinet FortiGate 60F \u2014 excellent price-to-performance ratio, widely supported in India<\/li>\n\n\n\n<li>Sophos XG Firewall \u2014 strong web filtering and email security integration<\/li>\n\n\n\n<li>pfSense with Suricata IDS\/IPS \u2014 open-source option for budget-conscious teams<\/li>\n<\/ul>\n\n\n\n<p><strong>Pro Tip: <\/strong>Always enable geo-blocking to restrict traffic from high-risk countries. India-based businesses rarely need inbound connections from Eastern Europe or certain Asian regions. Blocking these at the firewall level eliminates a significant percentage of automated attacks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 2: Implement Network Segmentation with VLANs<\/h2>\n\n\n\n<p>Network segmentation is the practice of dividing your network into isolated zones (segments) so that a breach in one area cannot automatically spread to the rest of your infrastructure. This is implemented using Virtual Local Area Networks (VLANs).<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended VLAN Structure for a Small Business<\/h3>\n\n\n\n<p>Consider this segmentation model:<\/p>\n\n\n\n<ol class=\"wp-block-list\">\n<li>VLAN 10 \u2014 Corporate LAN (workstations, printers)<\/li>\n\n\n\n<li>VLAN 20 \u2014 Servers (file server, database, ERP)<\/li>\n\n\n\n<li>VLAN 30 \u2014 Guest WiFi (completely isolated from internal resources)<\/li>\n\n\n\n<li>VLAN 40 \u2014 CCTV \/ IoT devices (cameras, access control)<\/li>\n\n\n\n<li>VLAN 50 \u2014 Management (network devices, switches, APs \u2014 admin only)<\/li>\n<\/ol>\n\n\n\n<p>Inter-VLAN routing should be controlled by Access Control Lists (ACLs) on your Layer 3 switch or firewall. For example, workstations in VLAN 10 should only be able to access specific ports on the server VLAN \u2014 not the entire subnet.<\/p>\n\n\n\n<p><strong>Pro Tip: <\/strong>Never put IoT devices like CCTV cameras, smart locks, or printers on the same VLAN as your servers. These devices almost never receive security patches and are frequently exploited as pivot points into server infrastructure.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 3: Set Up a Site-to-Site or Remote Access VPN<\/h2>\n\n\n\n<p>With hybrid work becoming standard in Indian businesses, employees accessing internal resources over public internet connections is now a daily reality. Without a VPN, all that traffic is visible to anyone on the same network \u2014 coffee shops, co-working spaces, hotel WiFi.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">VPN Options Based on Use Case<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IPSec Site-to-Site VPN \u2014 connect two office locations with encrypted tunnels (ideal for businesses with multiple branches in Delhi NCR)<\/li>\n\n\n\n<li>SSL VPN (OpenVPN \/ WireGuard) \u2014 remote access for individual employees; WireGuard is recommended for its modern cryptography and lower overhead<\/li>\n\n\n\n<li>Zero Trust Network Access (ZTNA) \u2014 the modern replacement for VPN; verifies both user identity and device health before granting access<\/li>\n<\/ul>\n\n\n\n<p>For most Indian SMEs, <strong>WireGuard-based SSL VPN<\/strong> deployed on a dedicated VPN server or your NGFW is the right starting point. WireGuard uses ChaCha20 encryption and is significantly faster than legacy OpenVPN while being far simpler to audit.<\/p>\n\n\n\n<p><strong>Pro Tip: <\/strong>Always enforce Multi-Factor Authentication (MFA) on VPN logins. A stolen password alone should never be sufficient to access your internal network.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 4: Enforce Strong Password Policies and MFA Everywhere<\/h2>\n\n\n\n<p>According to Verizon&#8217;s Data Breach Investigations Report, over 80% of hacking-related breaches involve stolen or brute-forced credentials. This is the single most preventable attack vector and yet remains the most neglected in Indian SMEs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Password Policy Requirements (Minimum Standards)<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Minimum 12 characters \u2014 mix of uppercase, lowercase, numbers, and special characters<\/li>\n\n\n\n<li>No password reuse \u2014 enforce history of last 12 passwords<\/li>\n\n\n\n<li>Maximum password age \u2014 90 days for standard users, 60 days for admin accounts<\/li>\n\n\n\n<li>Account lockout \u2014 lock after 5 failed attempts with 15-minute lockout duration<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">MFA Implementation Priority<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Admin accounts on all servers \u2014 highest priority<\/li>\n\n\n\n<li>VPN access \u2014 mandatory before any remote connection<\/li>\n\n\n\n<li>Email (Microsoft 365 \/ Google Workspace) \u2014 phishing entry point<\/li>\n\n\n\n<li>Cloud management consoles (AWS, Azure) \u2014 cryptomining attacks target these<\/li>\n\n\n\n<li>Domain admin accounts on Active Directory<\/li>\n<\/ul>\n\n\n\n<p><strong>Pro Tip: <\/strong>Use hardware security keys (like YubiKey) for domain admin and server admin accounts. SMS-based OTP can be intercepted via SIM swapping \u2014 hardware keys cannot.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 5: Keep All Systems Patched \u2014 Linux and Windows<\/h2>\n\n\n\n<p>Unpatched vulnerabilities are the highway that attackers use to enter your network. The WannaCry ransomware attack that paralyzed hundreds of Indian organizations in 2017 exploited a Windows vulnerability (MS17-010) for which Microsoft had released a patch 59 days earlier. Every machine that got infected simply had not applied that patch.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Patch Management Strategy<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Windows Servers \u2014 use WSUS (Windows Server Update Services) to centrally manage and deploy patches across all Windows machines<\/li>\n\n\n\n<li>Linux Servers \u2014 automate security updates using unattended-upgrades (Debian\/Ubuntu) or dnf-automatic (RHEL\/CentOS)<\/li>\n\n\n\n<li>Network devices \u2014 subscribe to vendor security advisories for your firewall and switches; apply firmware updates within 30 days of release<\/li>\n\n\n\n<li>Third-party software \u2014 tools like Qualys or Nessus can scan your network and report on unpatched third-party applications<\/li>\n<\/ul>\n\n\n\n<p>For RHEL-based servers, the command yum updateinfo list security lists all available security patches specifically \u2014 useful for prioritizing critical fixes.<\/p>\n\n\n\n<p><strong>Pro Tip: <\/strong>Never patch production servers directly without testing in a staging environment first. Use a maintenance window on weekends. Always take a snapshot or backup before applying kernel updates.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 6: Deploy an Intrusion Detection and Prevention System (IDS\/IPS)<\/h2>\n\n\n\n<p>A firewall controls what traffic is allowed in and out. An IDS\/IPS watches what is actually happening inside your network and alerts you \u2014 or blocks \u2014 suspicious activity in real time.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">IDS vs IPS<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>IDS (Intrusion Detection System) \u2014 passively monitors and alerts; does not block traffic<\/li>\n\n\n\n<li>IPS (Intrusion Prevention System) \u2014 actively blocks malicious traffic in real time<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Recommended Tools<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Suricata \u2014 high-performance, open-source IDS\/IPS; supports multi-threading and runs well on modern Linux servers<\/li>\n\n\n\n<li>Snort 3 \u2014 the industry standard; backed by Cisco Talos threat intelligence<\/li>\n\n\n\n<li>Zeek (formerly Bro) \u2014 excellent for network traffic analysis and forensics<\/li>\n<\/ul>\n\n\n\n<p>Deploy your IDS\/IPS sensor on a network TAP or SPAN port on your core switch so it can see all internal traffic \u2014 not just traffic entering from the internet. Lateral movement attacks (attacker moving from one internal machine to another) are only visible from inside the network.<\/p>\n\n\n\n<p><strong>Pro Tip: <\/strong>Configure alerts for these high-priority signatures first: port scanning, SMB exploits (EternalBlue), DNS tunneling, unusual data exfiltration volumes, and repeated failed authentication attempts across multiple hosts.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 7: Secure Your WiFi Infrastructure<\/h2>\n\n\n\n<p>Poorly secured WiFi is one of the most common entry points into small business networks in India. Default router passwords, WPA2-PSK with weak passphrases, and no guest network isolation are extremely common.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">WiFi Security Checklist<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use WPA3 encryption \u2014 WPA2 TKIP is broken; WPA2 AES is acceptable but WPA3 is strongly preferred for new deployments<\/li>\n\n\n\n<li>Change default SSID and admin password on every access point immediately upon deployment<\/li>\n\n\n\n<li>Disable WPS (Wi-Fi Protected Setup) \u2014 it has a known brute-force vulnerability (Pixie Dust attack)<\/li>\n\n\n\n<li>Enable 802.1X authentication for corporate WiFi \u2014 employees authenticate with their domain credentials, not a shared password<\/li>\n\n\n\n<li>Create a separate Guest SSID on an isolated VLAN with client isolation enabled<\/li>\n\n\n\n<li>Reduce WiFi transmit power to minimize signal bleed outside your office perimeter<\/li>\n<\/ul>\n\n\n\n<p><strong>Pro Tip: <\/strong>Use a RADIUS server (FreeRADIUS on Linux is free and excellent) with 802.1X for your corporate WiFi. This way, when an employee leaves, disabling their Active Directory account automatically revokes their WiFi access \u2014 no need to change shared passwords.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 8: Implement a Robust Backup and Disaster Recovery Plan<\/h2>\n\n\n\n<p>Ransomware attacks in India increased by 53% in 2023. The attackers&#8217; model is simple: encrypt your data, demand payment in cryptocurrency. The only effective defence against ransomware \u2014 short of never getting infected \u2014 is having clean, tested, offline backups.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">The 3-2-1 Backup Rule<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>3 copies of your data<\/li>\n\n\n\n<li>2 different storage media (e.g., local NAS + cloud)<\/li>\n\n\n\n<li>1 copy completely offline and air-gapped<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Backup Strategy for Indian SMEs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Daily incremental backups of all servers using Bacula, Amanda, or Veeam<\/li>\n\n\n\n<li>Weekly full backups to a NAS device on a separate network segment<\/li>\n\n\n\n<li>Monthly backups to an offsite location or cloud (AWS S3 with Object Lock \u2014 prevents ransomware from deleting backups)<\/li>\n\n\n\n<li>Test restore procedures quarterly \u2014 a backup that has never been tested is not a backup<\/li>\n<\/ul>\n\n\n\n<p><strong>Pro Tip: <\/strong>Enable S3 Object Lock (WORM \u2014 Write Once Read Many) on your cloud backup bucket. Even if an attacker compromises your AWS credentials, they cannot delete or modify locked backup objects.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 9: Control Access with the Principle of Least Privilege<\/h2>\n\n\n\n<p>The Principle of Least Privilege (PoLP) states that every user, process, and system should have the minimum level of access necessary to perform its function \u2014 and nothing more. This is one of the most powerful concepts in security and one of the most consistently violated in Indian SMEs.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Implementation Across Your Infrastructure<\/h3>\n\n\n\n<h3 class=\"wp-block-heading\">Active Directory \/ User Accounts<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Separate admin accounts from daily-use accounts \u2014 your IT admin should have one account for email\/browsing and a separate account for administrative tasks<\/li>\n\n\n\n<li>Use Role-Based Access Control (RBAC) \u2014 define roles and assign permissions to roles, not individuals<\/li>\n\n\n\n<li>Audit group memberships quarterly \u2014 remove users from groups they no longer need<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">Linux Server Access<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Use sudo with granular permissions \u2014 define exactly which commands each user can run as root<\/li>\n\n\n\n<li>Implement SSH key authentication \u2014 disable password-based SSH login entirely<\/li>\n<\/ul>\n\n\n\n<p><strong>Pro Tip: <\/strong>Run a quarterly access review. Pull a report of all users with admin privileges across all systems. You will almost always find former employees, unused service accounts, or over-provisioned users that represent active security risks.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Tip 10: Monitor, Log, and Respond \u2014 Deploy a SIEM<\/h2>\n\n\n\n<p>You cannot defend what you cannot see. Security monitoring is the difference between discovering an attack after your data is stolen versus detecting and stopping it in real time. This requires centralized log management and a Security Information and Event Management (SIEM) system.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">What to Log<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Authentication events \u2014 successful and failed logins on all servers, firewalls, and VPN<\/li>\n\n\n\n<li>Firewall logs \u2014 blocked connections, policy violations, geo-block triggers<\/li>\n\n\n\n<li>DNS queries \u2014 unusual external DNS lookups often indicate malware command-and-control activity<\/li>\n\n\n\n<li>File access on sensitive directories \u2014 especially on file servers containing financial or customer data<\/li>\n\n\n\n<li>Privileged command execution \u2014 every sudo command on Linux servers<\/li>\n<\/ul>\n\n\n\n<h3 class=\"wp-block-heading\">SIEM Options for SMEs<\/h3>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Wazuh \u2014 open-source SIEM\/XDR; excellent for Linux\/Windows environments; free<\/li>\n\n\n\n<li>Elastic SIEM (ELK Stack) \u2014 powerful, scalable, free; requires more setup expertise<\/li>\n\n\n\n<li>Graylog \u2014 strong log management with alerting; easier to set up than ELK<\/li>\n<\/ul>\n\n\n\n<p>Set up automated alerts for: multiple failed SSH logins from the same IP, large data transfers at unusual hours, new admin account creation, and firewall policy changes outside maintenance windows.<\/p>\n\n\n\n<p><strong>Pro Tip: <\/strong>Forward all logs to a remote syslog server that is separate from your main infrastructure and write-protected. Attackers routinely delete local logs to cover their tracks \u2014 remote logs are your forensic evidence.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Quick Reference: Network Security Checklist<\/h2>\n\n\n\n<figure class=\"wp-block-table\"><table class=\"has-fixed-layout\"><thead><tr><td><strong>Security Measure<\/strong><\/td><td><strong>Priority<\/strong><\/td><td><strong>Difficulty<\/strong><\/td><\/tr><\/thead><tbody><tr><td>Next-Generation Firewall<\/td><td><strong>Critical<\/strong><\/td><td>Medium<\/td><\/tr><tr><td>Network Segmentation (VLANs)<\/td><td><strong>Critical<\/strong><\/td><td>Medium<\/td><\/tr><tr><td>VPN Setup<\/td><td>High<\/td><td>Medium<\/td><\/tr><tr><td>Strong Passwords + MFA<\/td><td><strong>Critical<\/strong><\/td><td>Low<\/td><\/tr><tr><td>Patch Management<\/td><td><strong>Critical<\/strong><\/td><td>Low<\/td><\/tr><tr><td>IDS\/IPS Deployment<\/td><td>High<\/td><td>High<\/td><\/tr><tr><td>WiFi Security (WPA3 + 802.1X)<\/td><td>High<\/td><td>Medium<\/td><\/tr><tr><td>Backup &amp; Disaster Recovery<\/td><td><strong>Critical<\/strong><\/td><td>Medium<\/td><\/tr><tr><td>Principle of Least Privilege<\/td><td>High<\/td><td>Low<\/td><\/tr><tr><td>SIEM &amp; Log Monitoring<\/td><td>High<\/td><td>High<\/td><\/tr><\/tbody><\/table><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">Conclusion<\/h2>\n\n\n\n<p>Network security is not a one-time project \u2014 it is an ongoing discipline. Implementing these 10 measures will put your small business significantly ahead of the majority of Indian SMEs from a security posture standpoint. But technology alone is not enough \u2014 you also need trained staff, documented procedures, and regular audits.<\/p>\n\n\n\n<p>Start with the Critical priority items: deploy your NGFW, enforce MFA everywhere, establish a backup process, and patch your systems. These four steps alone will eliminate the vast majority of attack vectors that small businesses in India face today.<\/p>\n\n\n\n<p>For the High difficulty items like SIEM deployment and IDS\/IPS configuration, working with an experienced IT infrastructure partner makes a significant difference. At <strong>CN Infoline<\/strong>, our RHCE-certified team has deployed these exact solutions for businesses across Delhi NCR. We handle the complexity so you can focus on running your business.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Need Help Securing Your Network?<\/h2>\n\n\n\n<p>CN Infoline provides end-to-end network security services for small and medium businesses in Delhi NCR \u2014 from firewall deployment and VLAN setup to VPN configuration and 24\/7 monitoring.<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Call us directly: +91 8510805086<\/li>\n\n\n\n<li>Email: sales@cninfoline.com<\/li>\n\n\n\n<li>Request a free consultation: Visit cninfoline.com and click Request a Free Consultation<\/li>\n\n\n\n<li>WhatsApp us instantly: wa.me\/918510805086<\/li>\n<\/ul>\n\n\n\n<p><em>Our team typically responds within 2 hours during business hours (Mon-Sat, 9am-7pm IST).<\/em><\/p>\n\n\n\n<p><strong>Related Posts You May Like<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Linux vs Windows Server: Which Is Right for Your Business in India?<\/li>\n\n\n\n<li>What Is RHCE Certification and Why Should Your IT Partner Have It?<\/li>\n\n\n\n<li>How to Set Up a VPN for Your Office in India: Complete Guide 2026<\/li>\n\n\n\n<li>Server Administration Best Practices for Small Business in Delhi NCR<\/li>\n<\/ul>\n\n\n\n<p><\/p>\n","protected":false},"excerpt":{"rendered":"<p>By CN Infoline | Estimated Read Time: 10 min | Category: Cybersecurity India is under cyberattack. According to the Indian Computer Emergency Response Team (CERT-In), India witnessed over 13.91 lakh cybersecurity incidents in 2022 alone \u2014 and small businesses were the primary targets. Why? Because attackers know that small and medium enterprises (SMEs) typically invest [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3],"tags":[7,6,4,5,8],"class_list":["post-6","post","type-post","status-publish","format-standard","hentry","category-cybersecurity","tag-cybersecurity-india","tag-firewall-setup","tag-network-security","tag-small-business-it","tag-vpn"],"_links":{"self":[{"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/posts\/6","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/comments?post=6"}],"version-history":[{"count":2,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/posts\/6\/revisions"}],"predecessor-version":[{"id":9,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/posts\/6\/revisions\/9"}],"wp:attachment":[{"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/media?parent=6"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/categories?post=6"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cninfoline.com\/blog\/wp-json\/wp\/v2\/tags?post=6"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}