{"id":33487,"date":"2022-06-21T13:45:33","date_gmt":"2022-06-21T13:45:33","guid":{"rendered":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/"},"modified":"2024-01-11T12:11:37","modified_gmt":"2024-01-11T17:11:37","slug":"data-security-in-recruitment","status":"publish","type":"post","link":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/","title":{"rendered":"Data Security In Recruitment"},"content":{"rendered":"\n<p><span style=\"font-weight: 400;\">When it comes to data security, all recruiters need the right level of training and awareness. But the right applicant tracking system (ATS) should be able to handle data security, freeing up recruitment professionals to focus on their core business.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Your applicant tracking system (ATS) is the gateway to a goldmine of personal and enterprise data. And with recent and ongoing developments in data privacy regulations, such as General Data Protection Regulation (GDPR), a data breach can be costly, inflicting irreparable damage to your client\u2019s and candidate&#8217;s trust and your company\u2019s reputation.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Whether your sensitive data is held in a public cloud, private cloud, or on premises, recruitment firms and HR professionals have an obligation to ensure data security and compliance with data privacy law and regulations. So how can you protect company, client, and candidate data from the threat of cyberattacks, unauthorized access, or even accidental exposure?&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Let\u2019s take a closer look at data security in recruitment, and how you can mitigate the risk by taking the right preventative measures.&nbsp;<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is data security?<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Data security involves protecting digital information from corruption and unauthorized access wherever it resides, in transit, at rest, or at the end of its lifecycle when it\u2019s no longer required. Digital data security can be enacted in a number of ways, including encryption, masking, and tokenization. It also requires additional measures to mitigate data breaches, including backup copies and secure storage.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why is data security important?<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Research shows that in 2020 there were nearly <\/span><a href=\"https:\/\/www.statista.com\/statistics\/194246\/cyber-crime-incidents-victim-industry-size\/\"><span style=\"font-weight: 400;\">30,000<\/span><\/a><span style=\"font-weight: 400;\"> cybersecurity incidents worldwide, with 3,236 in the public sector and 2,935 in the&nbsp; information industry. In the same year, there were over <\/span><a href=\"https:\/\/www.statista.com\/topics\/4136\/ransomware\/#topicHeader__wrapper\"><span style=\"font-weight: 400;\">300 million<\/span><\/a><span style=\"font-weight: 400;\"> reported ransomware attacks \u2013 where attackers threaten to permanently prevent access to a victim\u2019s data unless a ransom is paid.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Unsurprisingly, two of the most targeted file types are database file extensions (like .db) and SQL (Structured Query Language) which is the standard language for manipulating database, and relational database management systems. Both of these file types are commonly used by every type of recruitment professional, from recruitment agencies to HR departments.&nbsp; But with the right ATS in place, there\u2019s no undue cause for alarm.<\/span><\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What are the different types of data security?<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Organizations of every size have a raft of data security measures at their disposal. The right security solution, as part of a wider internal security strategy, will take account of the risk, compliance regulations, and sensitivity of specific datasets to deploy the right level of security control. This helps to mitigate the risks in data handling and storage.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Recruitment is one example of an industry that deals with a constant flow of incoming and outgoing flow of personal and organizational data. And like other industries, there are common data security measures that can be put in place for reducing risk and avoiding a breach. These include:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Encryption&nbsp;<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Backups and recovery<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Secure storage<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Authentication<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Access controls<\/span><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">An ATS that\u2019s compliant and secure<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">As a provider of recruitment CRM \/ ATS hybrid, <a href=\"https:\/\/www.pcrecruiter.net\/site\">CLICK HERE TO LEARN MORE<\/a> handles large volumes of sensitive data every day \u2013 between 8,000 and 9,000 separate databases ranging from 100MB to 7TB in size. So for us, data security is business critical and a core part of what we do.<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Our ISO certified data center has a rigorous security process for entry, 24\/7 staffing and caged equipment. Whilst we can offer bespoke levels of security encryption (including asymmetrical encryption for organizations who wish to encrypt their own data) all of our data undergoes industry standard encryption. And anything leaving one of our data centers is automatically encrypted, such as quarterly backups, which are removed and stored securely in a vault. Plus, we back up to two separate geographic locations in case of a natural disaster or security incident in one location.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Our software is regularly scheduled for pen testing (ethical hacking) to evaluate the robustness of its security features. In addition, developers go through extensive training in data security. For third-party developers wishing to utilize our application programming interface (API), we provide access tokens which restrict access to specific functionality.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Alongside these security measures, we offer opt-in security settings for recruiters. These include the following Two-Factor Authentication (2FA) settings:<\/span><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Invalid password lock out<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Email authentication<\/span><\/li><li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">TOPTP (time-based one-time password)<\/span><\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">Peace of mind with PCRecruiter<\/h2>\n\n\n\n<p><span style=\"font-weight: 400;\">Since 1997, Main Sequence \u2013 the company behind PCRecruiter \u2013 has built a strong reputation for being one of the world\u2019s most trusted and successful developers of recruitment, sourcing, and applicant tracking software. PCRecruiter is a software as a service (SaaS) built on its own operating system and platform with cybersecurity baked in. It provides thousands of recruiters around the world with data security they both need and trust.&nbsp;<\/span><\/p>\n\n\n\n<p><span style=\"font-weight: 400;\">Find out more about our commitment to the highest standards in data protection and adherence to compliance regulations in our blog post <\/span><a href=\"https:\/\/www.pcrecruiter.net\/site\/gdpr\/\"><span style=\"font-weight: 400;\">PCRecruiter is ready for the GDPR<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Every day, recruitment organizations handle huge volumes of sensitive data in file types that are common targets for ransomware. Data security may not be at the forefront of what you do, but it\u2019s critical for maintaining client and customer trust and your business reputation. Find out how the right applicant tracking software can handle your data security needs.<\/p>\n","protected":false},"author":13,"featured_media":33488,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"footnotes":""},"categories":[33],"tags":[],"class_list":["post-33487","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-topics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\r\n<title>Data Security In Recruitment - PCRecruiter<\/title>\r\n<meta name=\"description\" content=\"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.\" \/>\r\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\r\n<link rel=\"canonical\" href=\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\" \/>\r\n<meta property=\"og:locale\" content=\"en_US\" \/>\r\n<meta property=\"og:type\" content=\"article\" \/>\r\n<meta property=\"og:title\" content=\"Data Security In Recruitment - PCRecruiter\" \/>\r\n<meta property=\"og:description\" content=\"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.\" \/>\r\n<meta property=\"og:url\" content=\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\" \/>\r\n<meta property=\"og:site_name\" content=\"PCRecruiter\" \/>\r\n<meta property=\"article:publisher\" content=\"https:\/\/facebook.com\/PCRecruiter\" \/>\r\n<meta property=\"article:published_time\" content=\"2022-06-21T13:45:33+00:00\" \/>\r\n<meta property=\"article:modified_time\" content=\"2024-01-11T17:11:37+00:00\" \/>\r\n<meta property=\"og:image\" content=\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png\" \/>\r\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\r\n\t<meta property=\"og:image:height\" content=\"628\" \/>\r\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\r\n<meta name=\"author\" content=\"PCRecruiter\" \/>\r\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\r\n<meta name=\"twitter:creator\" content=\"@PCRecruiter\" \/>\r\n<meta name=\"twitter:site\" content=\"@PCRecruiter\" \/>\r\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"PCRecruiter\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\r\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\"},\"author\":\"PCRecruiter\",\"headline\":\"Data Security In Recruitment\",\"datePublished\":\"2022-06-21T13:45:33+00:00\",\"dateModified\":\"2024-01-11T17:11:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\"},\"wordCount\":820,\"publisher\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png\",\"articleSection\":[\"Topics\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\",\"name\":\"Data Security In Recruitment - PCRecruiter\",\"isPartOf\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png\",\"datePublished\":\"2022-06-21T13:45:33+00:00\",\"dateModified\":\"2024-01-11T17:11:37+00:00\",\"description\":\"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png\",\"contentUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png\",\"width\":1200,\"height\":628},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.pcrecruiter.net\/site\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Security In Recruitment\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#website\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/\",\"name\":\"PCRecruiter\",\"description\":\"PCRM &amp; PCR - Software for Recruiters\",\"publisher\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.pcrecruiter.net\/site\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#organization\",\"name\":\"PCRecruiter\",\"alternateName\":\"Main Sequence Technology, Inc.\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png\",\"contentUrl\":\"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png\",\"width\":1200,\"height\":627,\"caption\":\"PCRecruiter\"},\"image\":{\"@id\":\"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/facebook.com\/PCRecruiter\",\"https:\/\/x.com\/PCRecruiter\",\"https:\/\/linkedin.com\/company\/PCRecruiter\"]}]}<\/script>\r\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Data Security In Recruitment - PCRecruiter","description":"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/","og_locale":"en_US","og_type":"article","og_title":"Data Security In Recruitment - PCRecruiter","og_description":"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.","og_url":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/","og_site_name":"PCRecruiter","article_publisher":"https:\/\/facebook.com\/PCRecruiter","article_published_time":"2022-06-21T13:45:33+00:00","article_modified_time":"2024-01-11T17:11:37+00:00","og_image":[{"width":1200,"height":628,"url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png","type":"image\/png"}],"author":"PCRecruiter","twitter_card":"summary_large_image","twitter_creator":"@PCRecruiter","twitter_site":"@PCRecruiter","twitter_misc":{"Written by":"PCRecruiter","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#article","isPartOf":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/"},"author":"PCRecruiter","headline":"Data Security In Recruitment","datePublished":"2022-06-21T13:45:33+00:00","dateModified":"2024-01-11T17:11:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/"},"wordCount":820,"publisher":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#organization"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png","articleSection":["Topics"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/","url":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/","name":"Data Security In Recruitment - PCRecruiter","isPartOf":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage"},"thumbnailUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png","datePublished":"2022-06-21T13:45:33+00:00","dateModified":"2024-01-11T17:11:37+00:00","description":"Recruitment organizations handle huge volumes of file types that can be common targets for ransomware. Data security is critical to your business.","breadcrumb":{"@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#primaryimage","url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png","contentUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2022\/07\/data-security.png","width":1200,"height":628},{"@type":"BreadcrumbList","@id":"https:\/\/www.pcrecruiter.net\/site\/2022\/06\/21\/data-security-in-recruitment\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.pcrecruiter.net\/site\/"},{"@type":"ListItem","position":2,"name":"Data Security In Recruitment"}]},{"@type":"WebSite","@id":"https:\/\/www.pcrecruiter.net\/site\/#website","url":"https:\/\/www.pcrecruiter.net\/site\/","name":"PCRecruiter","description":"PCRM &amp; PCR - Software for Recruiters","publisher":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.pcrecruiter.net\/site\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.pcrecruiter.net\/site\/#organization","name":"PCRecruiter","alternateName":"Main Sequence Technology, Inc.","url":"https:\/\/www.pcrecruiter.net\/site\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/","url":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png","contentUrl":"https:\/\/www.pcrecruiter.net\/site\/wp-content\/uploads\/2020\/08\/PCRecruiter-1200px.png","width":1200,"height":627,"caption":"PCRecruiter"},"image":{"@id":"https:\/\/www.pcrecruiter.net\/site\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/facebook.com\/PCRecruiter","https:\/\/x.com\/PCRecruiter","https:\/\/linkedin.com\/company\/PCRecruiter"]}]}},"_links":{"self":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/33487","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/users\/13"}],"replies":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/comments?post=33487"}],"version-history":[{"count":2,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/33487\/revisions"}],"predecessor-version":[{"id":37837,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/posts\/33487\/revisions\/37837"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/media\/33488"}],"wp:attachment":[{"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/media?parent=33487"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/categories?post=33487"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.pcrecruiter.net\/site\/wp-json\/wp\/v2\/tags?post=33487"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}