{"id":18683,"date":"2026-04-01T16:18:55","date_gmt":"2026-04-01T16:18:55","guid":{"rendered":"https:\/\/exxor.com.au\/?p=18683"},"modified":"2026-04-01T16:25:22","modified_gmt":"2026-04-01T16:25:22","slug":"why-norton-360-remains-a-core-recommendation-for-clients","status":"publish","type":"post","link":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/","title":{"rendered":"Why Norton 360 Remains a Core Recommendation for Our Clients"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"18683\" class=\"elementor elementor-18683\" data-elementor-post-type=\"post\">\n\t\t\t\t<div class=\"elementor-element elementor-element-474bff66 e-flex e-con-boxed e-con e-parent\" data-id=\"474bff66\" data-element_type=\"container\" data-e-type=\"container\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-323476be elementor-widget elementor-widget-text-editor\" data-id=\"323476be\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p>In the IT consultancy space, we are often asked if third-party security suites are still necessary in an era where operating systems come with built-in protection. While basic security has improved, the threat landscape\u2014specifically ransomware and sophisticated phishing\u2014has evolved even faster. After evaluating various endpoint security solutions, we continue to recommend Norton 360 for specific client use cases. Here is a technical breakdown of where this suite provides genuine value beyond standard OS security.<\/p><p><strong>1. Behavioral Heuristics vs. Signature-Based Scanning<\/strong><br \/>Traditional antivirus relies on &#8220;signatures&#8221; (a database of known threats). However, modern attacks use &#8220;polymorphic&#8221; code that changes constantly.<br \/>The Difference: Norton utilizes SONAR behavioral protection. Instead of just looking at what a file is, it monitors what the file does. If a background process suddenly starts encrypting files or modifying system registries, Norton intercepts the process before the payload is fully delivered.<\/p><p><strong>2. Eliminating the &#8220;Single Point of Failure&#8221;<\/strong><br \/>Relying solely on built-in OS security creates a single point of failure. If an exploit bypasses the Windows or macOS kernel, the built-in defenses are often the first things disabled.<br \/>Why a Third Party Matters: Norton operates as an independent layer. For our clients handling sensitive data, having a secondary, hardened firewall and an independent scanning engine provides the &#8220;Defense in Depth&#8221; strategy that we preach in cybersecurity.<\/p><p><strong>3. Integrated Backup as a Ransomware Contingency<\/strong><br \/>The most effective defense against ransomware isn&#8217;t just blocking the attack\u2014it&#8217;s having a recovery path.<br \/><em><strong>Consultant\u2019s View<\/strong><\/em>: Norton 360 includes Cloud Backup integrated directly into the security dashboard. By automating the backup of critical documents to a secure, off-site location, we can ensure that even in a &#8220;worst-case scenario,&#8221; business continuity is maintained without paying a ransom.<\/p><p><strong>4. Patch Management and Vulnerability Shielding<\/strong><br \/>Many breaches occur because of outdated third-party software (like Adobe, Zoom, or old drivers).<br \/><em><strong>The Feature<\/strong><\/em>: Norton\u2019s Software Updater identifies these vulnerabilities. For a small business or a busy professional, this automation closes the &#8220;security gap&#8221; that exists between manual updates.<\/p><p><strong>5. Managing the &#8220;Human Element&#8221;<\/strong><br \/>Identity theft and credential leaks are often the result of human error, not system flaws.<br \/><em><strong>Risk Mitigation<\/strong><\/em>: The inclusion of Dark Web Monitoring and a Password Manager addresses the human side of security. We recommend this suite because it forces better &#8220;security hygiene&#8221;\u2014notifying users when their credentials appear in leaked databases before an account is actually compromised.<\/p><p><strong>Final Technical Assessment<\/strong><br \/>Norton 360 is not a &#8220;magic bullet,&#8221; and no software can replace a solid security policy. However, for users who need a &#8220;set-and-forget&#8221; solution that combines endpoint protection, identity monitoring, and cloud-based recovery, it remains one of the most stable and comprehensive suites on the market.<\/p><blockquote><p><strong><span style=\"color: #333399;\">Affiliate Disclosure<\/span><\/strong>: This post contains affiliate links for Norton. If you choose to upgrade to a premium plan through these links, we may earn a small commission at no additional cost to you. This helps support the site and allows us to continue sharing high-quality tech recommendations.\u00a0<\/p><\/blockquote><p>Don&#8217;t leave your personal data to chance. <strong>Exxor Tech IT<\/strong> recommends <strong>Norton 360<\/strong> as a smart choice for anyone serious about overall protection of their device and online identities.<\/p><p>Ready to take your digital security to the next level?<\/p><p><strong>Would You To Explore Norton Subscription Plans?<\/strong><\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>In the IT consultancy space, we are often asked if third-party security suites are still necessary in an era where operating systems come with built-in protection. While basic security has improved, the threat landscape\u2014specifically ransomware and sophisticated phishing\u2014has evolved even faster. After evaluating various endpoint security solutions, we continue to recommend Norton 360 for specific [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":18687,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"content-type":"","footnotes":""},"categories":[1],"tags":[],"class_list":["post-18683","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-uncategorized"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT\" \/>\n<meta property=\"og:description\" content=\"In the IT consultancy space, we are often asked if third-party security suites are still necessary in an era where operating systems come with built-in protection. While basic security has improved, the threat landscape\u2014specifically ransomware and sophisticated phishing\u2014has evolved even faster. After evaluating various endpoint security solutions, we continue to recommend Norton 360 for specific [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/\" \/>\n<meta property=\"og:site_name\" content=\"Exxor Tech IT\" \/>\n<meta property=\"article:published_time\" content=\"2026-04-01T16:18:55+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-04-01T16:25:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation-1024x564.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1024\" \/>\n\t<meta property=\"og:image:height\" content=\"564\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/\"},\"author\":{\"name\":\"admin\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#\\\/schema\\\/person\\\/4a8d55aed85b8d479cf060bb80f360ba\"},\"headline\":\"Why Norton 360 Remains a Core Recommendation for Our Clients\",\"datePublished\":\"2026-04-01T16:18:55+00:00\",\"dateModified\":\"2026-04-01T16:25:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/\"},\"wordCount\":542,\"publisher\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Exxor-Tech-IT-recommendation.png\",\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/\",\"url\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/\",\"name\":\"Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Exxor-Tech-IT-recommendation.png\",\"datePublished\":\"2026-04-01T16:18:55+00:00\",\"dateModified\":\"2026-04-01T16:25:22+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#primaryimage\",\"url\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Exxor-Tech-IT-recommendation.png\",\"contentUrl\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2026\\\/04\\\/Exxor-Tech-IT-recommendation.png\",\"width\":1941,\"height\":1069},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/2026\\\/04\\\/01\\\/why-norton-360-remains-a-core-recommendation-for-clients\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/exxor.com.au\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Uncategorized\",\"item\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/category\\\/uncategorized\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Why Norton 360 Remains a Core Recommendation for Our Clients\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#website\",\"url\":\"https:\\\/\\\/exxor.com.au\\\/\",\"name\":\"Exxor Tech IT\",\"description\":\"The Best IT Services In Sydney\",\"publisher\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/exxor.com.au\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#organization\",\"name\":\"Exxor Tech IT\",\"url\":\"https:\\\/\\\/exxor.com.au\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/MAIN-sticky-trial.png\",\"contentUrl\":\"https:\\\/\\\/exxor.com.au\\\/wp-content\\\/uploads\\\/2023\\\/12\\\/MAIN-sticky-trial.png\",\"width\":320,\"height\":120,\"caption\":\"Exxor Tech IT\"},\"image\":{\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/exxor.com.au\\\/#\\\/schema\\\/person\\\/4a8d55aed85b8d479cf060bb80f360ba\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\\\/\\\/exxor.com.au\"],\"url\":\"https:\\\/\\\/exxor.com.au\\\/index.php\\\/author\\\/admin01\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/","og_locale":"en_US","og_type":"article","og_title":"Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT","og_description":"In the IT consultancy space, we are often asked if third-party security suites are still necessary in an era where operating systems come with built-in protection. While basic security has improved, the threat landscape\u2014specifically ransomware and sophisticated phishing\u2014has evolved even faster. After evaluating various endpoint security solutions, we continue to recommend Norton 360 for specific [&hellip;]","og_url":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/","og_site_name":"Exxor Tech IT","article_published_time":"2026-04-01T16:18:55+00:00","article_modified_time":"2026-04-01T16:25:22+00:00","og_image":[{"width":1024,"height":564,"url":"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation-1024x564.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_misc":{"Written by":"admin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#article","isPartOf":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/"},"author":{"name":"admin","@id":"https:\/\/exxor.com.au\/#\/schema\/person\/4a8d55aed85b8d479cf060bb80f360ba"},"headline":"Why Norton 360 Remains a Core Recommendation for Our Clients","datePublished":"2026-04-01T16:18:55+00:00","dateModified":"2026-04-01T16:25:22+00:00","mainEntityOfPage":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/"},"wordCount":542,"publisher":{"@id":"https:\/\/exxor.com.au\/#organization"},"image":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#primaryimage"},"thumbnailUrl":"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation.png","inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/","url":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/","name":"Why Norton 360 Remains a Core Recommendation for Our Clients - Exxor Tech IT","isPartOf":{"@id":"https:\/\/exxor.com.au\/#website"},"primaryImageOfPage":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#primaryimage"},"image":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#primaryimage"},"thumbnailUrl":"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation.png","datePublished":"2026-04-01T16:18:55+00:00","dateModified":"2026-04-01T16:25:22+00:00","breadcrumb":{"@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#primaryimage","url":"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation.png","contentUrl":"https:\/\/exxor.com.au\/wp-content\/uploads\/2026\/04\/Exxor-Tech-IT-recommendation.png","width":1941,"height":1069},{"@type":"BreadcrumbList","@id":"https:\/\/exxor.com.au\/index.php\/2026\/04\/01\/why-norton-360-remains-a-core-recommendation-for-clients\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/exxor.com.au\/"},{"@type":"ListItem","position":2,"name":"Uncategorized","item":"https:\/\/exxor.com.au\/index.php\/category\/uncategorized\/"},{"@type":"ListItem","position":3,"name":"Why Norton 360 Remains a Core Recommendation for Our Clients"}]},{"@type":"WebSite","@id":"https:\/\/exxor.com.au\/#website","url":"https:\/\/exxor.com.au\/","name":"Exxor Tech IT","description":"The Best IT Services In Sydney","publisher":{"@id":"https:\/\/exxor.com.au\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/exxor.com.au\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/exxor.com.au\/#organization","name":"Exxor Tech IT","url":"https:\/\/exxor.com.au\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/exxor.com.au\/#\/schema\/logo\/image\/","url":"https:\/\/exxor.com.au\/wp-content\/uploads\/2023\/12\/MAIN-sticky-trial.png","contentUrl":"https:\/\/exxor.com.au\/wp-content\/uploads\/2023\/12\/MAIN-sticky-trial.png","width":320,"height":120,"caption":"Exxor Tech IT"},"image":{"@id":"https:\/\/exxor.com.au\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/exxor.com.au\/#\/schema\/person\/4a8d55aed85b8d479cf060bb80f360ba","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/e4197bd6ae187cabbb5713eea158d182fcd3bb5f41c464b2c0dc175ff1f4c433?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/exxor.com.au"],"url":"https:\/\/exxor.com.au\/index.php\/author\/admin01\/"}]}},"_links":{"self":[{"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/posts\/18683","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/comments?post=18683"}],"version-history":[{"count":0,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/posts\/18683\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/media\/18687"}],"wp:attachment":[{"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/media?parent=18683"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/categories?post=18683"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/exxor.com.au\/index.php\/wp-json\/wp\/v2\/tags?post=18683"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}