{"id":1034,"date":"2026-03-17T09:00:33","date_gmt":"2026-03-17T17:00:33","guid":{"rendered":"https:\/\/greenmonkeysstudio.com\/blog\/?p=1034"},"modified":"2026-03-17T11:07:50","modified_gmt":"2026-03-17T19:07:50","slug":"update-everything-after-being-hacked","status":"publish","type":"post","link":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/","title":{"rendered":"Update Everything After Being Hacked"},"content":{"rendered":"<p><img decoding=\"async\" class=\"post-img alignnone\" src=\"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg\" alt='image of a person typing on their laptop with the words \"Updating Files\" overlaid.' \/><\/p>\n<article>\n<section>\n<p>Most hacks don\u2019t happen because a hacker \u201ctargeted\u201d you. They happen because something on your site was outdated \u2014 a plugin, a theme, your CMS, or even your server software. Attackers scan the internet looking for known vulnerabilities, and outdated tools are basically an open invitation.<!--more--> After a hack, <strong>updating everything is non\u2011negotiable<\/strong>. Even if you restored from a clean backup, you\u2019re still vulnerable if the underlying software is old. Updating isn\u2019t just maintenance \u2014 it\u2019s closing the exact door the hacker used to get in.<\/p>\n<\/section>\n<h2>What to Update (and Why It Matters)<\/h2>\n<h3>1. Your CMS (WordPress, Joomla, Drupal, etc.)<\/h3>\n<p>The core platform is often the biggest target. Updates patch security holes, fix bugs, and harden your site against known exploits. If your CMS is several versions behind, you\u2019re at high risk of reinfection.<\/p>\n<h3>2. Plugins and Extensions<\/h3>\n<p>These are the #1 source of website hacks. Many plugins are created by small teams who don\u2019t always update quickly. If a plugin hasn\u2019t been updated in years, it\u2019s safer to replace it entirely.<\/p>\n<p>Signs a plugin should be removed:<\/p>\n<ul>\n<li>No updates in 12+ months<\/li>\n<li>Poor reviews or abandoned support<\/li>\n<li>Known vulnerabilities listed online<\/li>\n<li>You don\u2019t actually use it anymore<\/li>\n<\/ul>\n<h3>3. Themes<\/h3>\n<p>Themes aren\u2019t just design \u2014 they contain code. Outdated themes can contain vulnerable scripts, outdated libraries, or insecure templates.<\/p>\n<p>If you\u2019re using a custom or heavily modified theme, make sure it\u2019s rebuilt or reviewed by a developer after a hack.<\/p>\n<h3>4. PHP Version<\/h3>\n<p>Your website runs on PHP, and older versions stop receiving security patches. Running PHP 7.4 or older is a major risk.<\/p>\n<p>Upgrading PHP improves:<\/p>\n<ul>\n<li>Security<\/li>\n<li>Speed<\/li>\n<li>Compatibility with modern plugins and themes<\/li>\n<\/ul>\n<h3>5. Server Software<\/h3>\n<p>Your hosting environment matters just as much as your CMS.<\/p>\n<p>Make sure your host updates:<\/p>\n<ul>\n<li>Apache or Nginx<\/li>\n<li>MySQL or MariaDB<\/li>\n<li>cPanel or hosting control panels<\/li>\n<li>Firewall and malware tools<\/li>\n<\/ul>\n<p>If your host doesn\u2019t keep things updated, it may be time to switch.<\/p>\n<h3>6. API Keys and Integrations<\/h3>\n<p>If your site was hacked, assume your API keys may have been exposed.<\/p>\n<p>Update or regenerate keys for:<\/p>\n<ul>\n<li>Payment processors<\/li>\n<li>Email marketing tools<\/li>\n<li>CRM systems<\/li>\n<li>Mapping or analytics services<\/li>\n<li>Any third\u2011party integration<\/li>\n<\/ul>\n<p>This prevents attackers from abusing your connected services.<\/p>\n<h2>If Something Hasn\u2019t Been Updated in Years\u2026 Replace It<\/h2>\n<p>Old plugins, abandoned themes, outdated page builders \u2014 these are all liabilities. Sometimes the safest move is to remove and rebuild instead of trying to patch something ancient.<\/p>\n<p>Think of it like replacing a broken lock instead of trying to fix it with duct tape.<\/p>\n<h2>Next Up: Locking Down Your Site Before Relaunching<\/h2>\n<p>Once everything is updated, the next step is tightening security so the hack doesn\u2019t happen again. We\u2019ll cover that in the next post.<\/p>\n<section>\n<h2>Need Help?<\/h2>\n<p><strong>Not sure what needs updating?<br \/>\n      Green Monkeys Studio can audit your entire site and update everything safely.<\/strong><\/p>\n<h3>Get Help Now<\/h3>\n<p>Call us at <a href=\"tel:(206) 551-6177\"><strong>(206) 551-6177<\/strong><\/a> or schedule a free consultation here at <a href=\"https:\/\/greenmonkeysstudio.com\/book-a-consultation\">https:\/\/greenmonkeysstudio.com\/book-a-consultation<\/a><\/p>\n<\/section>\n<\/article>\n","protected":false},"excerpt":{"rendered":"<p>Most hacks don\u2019t happen because a hacker \u201ctargeted\u201d you. They happen because something on your site was outdated \u2014 a plugin, a theme, your CMS, or even your server software. Attackers scan the internet looking for known vulnerabilities, and outdated tools are basically an open invitation.<\/p>\n","protected":false},"author":3,"featured_media":1040,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[17,36,1,3,7,20,24],"tags":[],"class_list":["post-1034","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-business","category-cybersecurity","category-uncategorized","category-web-design","category-web-security","category-website","category-wordpress"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design<\/title>\n<meta name=\"description\" content=\"Outdated software is the #1 cause of website hacks. Learn what to update after you&#039;ve been hacked and why it matters.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design\" \/>\n<meta property=\"og:description\" content=\"Outdated software is the #1 cause of website hacks. Learn what to update after you&#039;ve been hacked and why it matters.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/\" \/>\n<meta property=\"og:site_name\" content=\"Monkey Zone: All Things SEO and Design\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/GreenMonkeysStudio\/\" \/>\n<meta property=\"article:published_time\" content=\"2026-03-17T17:00:33+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-03-17T19:07:50+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"520\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Jesus Gonzalez\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jesus Gonzalez\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/\"},\"author\":{\"name\":\"Jesus Gonzalez\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/person\\\/5296cba915b97cf5031ce4847da4677b\"},\"headline\":\"Update Everything After Being Hacked\",\"datePublished\":\"2026-03-17T17:00:33+00:00\",\"dateModified\":\"2026-03-17T19:07:50+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/\"},\"wordCount\":498,\"publisher\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/upgrade-everything-after-being-hacked.jpg\",\"articleSection\":{\"0\":\"business\",\"1\":\"Cybersecurity\",\"3\":\"Web Design\",\"4\":\"Web Security\",\"5\":\"Website\",\"6\":\"WordPress\"},\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/\",\"name\":\"Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/upgrade-everything-after-being-hacked.jpg\",\"datePublished\":\"2026-03-17T17:00:33+00:00\",\"dateModified\":\"2026-03-17T19:07:50+00:00\",\"description\":\"Outdated software is the #1 cause of website hacks. Learn what to update after you've been hacked and why it matters.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#primaryimage\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/upgrade-everything-after-being-hacked.jpg\",\"contentUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2026\\\/03\\\/upgrade-everything-after-being-hacked.jpg\",\"width\":1200,\"height\":520,\"caption\":\"image of a person typing on their laptop with the words \\\"Updating Files\\\" overlaid.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/update-everything-after-being-hacked\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Update Everything After Being Hacked\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\",\"name\":\"Green Monkeys Studio\",\"description\":\"Be in the Monkey Zone of Information!\",\"publisher\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#organization\",\"name\":\"Green Monkeys Studio\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-gms-logo.png\",\"contentUrl\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/07\\\/cropped-gms-logo.png\",\"width\":512,\"height\":512,\"caption\":\"Green Monkeys Studio\"},\"image\":{\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/GreenMonkeysStudio\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/#\\\/schema\\\/person\\\/5296cba915b97cf5031ce4847da4677b\",\"name\":\"Jesus Gonzalez\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg\",\"caption\":\"Jesus Gonzalez\"},\"sameAs\":[\"https:\\\/\\\/greenmonkeysstudio.com\"],\"url\":\"https:\\\/\\\/greenmonkeysstudio.com\\\/blog\\\/author\\\/lexiriam\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design","description":"Outdated software is the #1 cause of website hacks. Learn what to update after you've been hacked and why it matters.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/","og_locale":"en_US","og_type":"article","og_title":"Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design","og_description":"Outdated software is the #1 cause of website hacks. Learn what to update after you've been hacked and why it matters.","og_url":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/","og_site_name":"Monkey Zone: All Things SEO and Design","article_publisher":"https:\/\/www.facebook.com\/GreenMonkeysStudio\/","article_published_time":"2026-03-17T17:00:33+00:00","article_modified_time":"2026-03-17T19:07:50+00:00","og_image":[{"width":1200,"height":520,"url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg","type":"image\/jpeg"}],"author":"Jesus Gonzalez","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Jesus Gonzalez","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#article","isPartOf":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/"},"author":{"name":"Jesus Gonzalez","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/person\/5296cba915b97cf5031ce4847da4677b"},"headline":"Update Everything After Being Hacked","datePublished":"2026-03-17T17:00:33+00:00","dateModified":"2026-03-17T19:07:50+00:00","mainEntityOfPage":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/"},"wordCount":498,"publisher":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg","articleSection":{"0":"business","1":"Cybersecurity","3":"Web Design","4":"Web Security","5":"Website","6":"WordPress"},"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/","url":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/","name":"Update Everything After Being Hacked - Monkey Zone: All Things SEO and Design","isPartOf":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#primaryimage"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#primaryimage"},"thumbnailUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg","datePublished":"2026-03-17T17:00:33+00:00","dateModified":"2026-03-17T19:07:50+00:00","description":"Outdated software is the #1 cause of website hacks. Learn what to update after you've been hacked and why it matters.","breadcrumb":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#primaryimage","url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg","contentUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2026\/03\/upgrade-everything-after-being-hacked.jpg","width":1200,"height":520,"caption":"image of a person typing on their laptop with the words \"Updating Files\" overlaid."},{"@type":"BreadcrumbList","@id":"https:\/\/greenmonkeysstudio.com\/blog\/update-everything-after-being-hacked\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/greenmonkeysstudio.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Update Everything After Being Hacked"}]},{"@type":"WebSite","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#website","url":"https:\/\/greenmonkeysstudio.com\/blog\/","name":"Green Monkeys Studio","description":"Be in the Monkey Zone of Information!","publisher":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/greenmonkeysstudio.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#organization","name":"Green Monkeys Studio","url":"https:\/\/greenmonkeysstudio.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2021\/07\/cropped-gms-logo.png","contentUrl":"https:\/\/greenmonkeysstudio.com\/blog\/wp-content\/uploads\/2021\/07\/cropped-gms-logo.png","width":512,"height":512,"caption":"Green Monkeys Studio"},"image":{"@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/GreenMonkeysStudio\/"]},{"@type":"Person","@id":"https:\/\/greenmonkeysstudio.com\/blog\/#\/schema\/person\/5296cba915b97cf5031ce4847da4677b","name":"Jesus Gonzalez","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","url":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/157d81e79f7460188737cff0f9fe1c56c13f70a47125d4a183d47dd44fa5c1a8?s=96&d=blank&r=pg","caption":"Jesus Gonzalez"},"sameAs":["https:\/\/greenmonkeysstudio.com"],"url":"https:\/\/greenmonkeysstudio.com\/blog\/author\/lexiriam\/"}]}},"_links":{"self":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1034","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/comments?post=1034"}],"version-history":[{"count":7,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1034\/revisions"}],"predecessor-version":[{"id":1043,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/posts\/1034\/revisions\/1043"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/media\/1040"}],"wp:attachment":[{"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/media?parent=1034"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/categories?post=1034"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/greenmonkeysstudio.com\/blog\/wp-json\/wp\/v2\/tags?post=1034"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}