{"id":11279,"date":"2016-07-21T09:00:24","date_gmt":"2016-07-21T14:00:24","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=11279"},"modified":"2016-11-22T17:00:40","modified_gmt":"2016-11-22T22:00:40","slug":"protect-your-data","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/","title":{"rendered":"How to Protect Your Data from Your Employees (and Yourself)"},"content":{"rendered":"<p class=\"p1\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-11337\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\" alt=\"Protect Your Data\" width=\"1200\" height=\"600\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png 1200w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data-300x150.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data-768x384.png 768w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data-1024x512.png 1024w\" sizes=\"(max-width: 1200px) 100vw, 1200px\" \/><\/p>\n<p class=\"p1\"><span class=\"s2\">No matter how careful you are about protecting your business information, there\u2019s always a risk someone will break into your system to steal customers\u2019 payment and password data. <\/span><span class=\"s1\">Although years of international data breach studies say theft is usually external, some of your staffers\u2019 work practices (and yours) may unintentionally make it easier for outsiders to breach your security. Here are some habits you and your employees should break.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Putting off updates<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">It\u2019s so, so tempting to dismiss those time-to-update notices from your antivirus program, your operating system, and your applications. You\u2019re busy, it only takes a quick click to clear your screen, and you can get back to work. The problem is that putting the update off can become a habit, and that leads to extra risk.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">That\u2019s because whenever an update notice goes out, hackers see it, too, and they start looking for businesses and networks that don\u2019t quickly patch their software. According to the global <a href=\"http:\/\/www.verizonenterprise.com\/verizon-insights-lab\/dbir\/2016\/\" target=\"_blank\"><span class=\"s3\">2016 Data Breach Investigations Report<\/span><\/a>, most of the attacks against out-of-date software happen within three months of the update announcement. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">If your team puts off updates to avoid work slowdowns, schedule updates to happen automatically overnight or at another time when your employees are offline. (Critical updates, of course, should happen as soon as possible.)<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">BYOD without bringing device security <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">Do you and your employees use your own mobile devices, tablets, and laptops to work while you\u2019re outside the office? If you have a 'bring your own device'\u009d policy (BYOD), you also need a <a href=\"http:\/\/www.computerweekly.com\/opinion\/BYOD-data-protection-and-information-security-issues\" target=\"_blank\"><span class=\"s3\">BYOD security policy<\/span><\/a> to protect your business information on those devices. Specifically, you need to ensure that you have control over which business data your staff can access on their own devices and have a way to remove that data if they resign, are fired, or lose their device. Just like your business network, employees\u2019 devices should have up-to-date security programs and software to protect their data and yours.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Exposing data to physical theft<\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">In the push to update your digital security, remember that physical security matters, too. If a bad apple finds the smartphone you left on the plane, the tablet sitting in your parked car, or the laptop you leave your desk, they can literally walk away with your data. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Insurer Horizon Blue Cross Blue Shield of New Jersey experienced this in 2013, when thieves stole two employee laptops and compromised data for 840,000 health-insurance clients. <a href=\"http:\/\/www.csoonline.com\/article\/2134215\/investigations-forensics\/blue-cross-840-000-healthcare-records-at-risk-after-laptop-theft.html\" target=\"_blank\">CSO Online<\/a> <span class=\"s3\">reported<\/span> that the machines sat in plain sight, attached to desks with cable locks that the thieves cut, and with no data encryption to protect customer records in case of theft or loss. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">Your employees should make sure to store laptops and other devices out of sight and under lock and key. It\u2019s up to you to ensure the devices use the necessary password and encryption tools. (<a href=\"https:\/\/www.hostgator.com\/passwords\">You can generate a secure password here.<\/a>) While you\u2019re protecting your current hardware, make sure you require employees to wipe data from old machines that are being replaced, too.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Clicking links in phishing emails <\/span><\/h2>\n<p class=\"p4\"><span class=\"s1\">The wave of phishing attempts is <a href=\"http:\/\/www.infosecurity-magazine.com\/news\/phishing-activity-hits-a-12-year\/\" target=\"_blank\"><span class=\"s3\">higher<\/span><\/a> than it\u2019s been in more than a decade. Phishing attacks trick email recipients into clicking on links that install data-stealing malware on networks. It can be hard to distinguish a genuine email from a phishing attempt, especially for employees whose jobs involve opening many emails (customer service, for example). The 2016 DBIR looked at millions of results from organization-sponsored phishing tests and found that about 12% of test messages led an employee to click on an infected link or attachment. Of those, just 3% reported the problem to a manager. <\/span><\/p>\n<p class=\"p4\"><span class=\"s1\">The DBIR recommends strong email filters as the first line of defense, because employees can\u2019t click on malware links they never see. The report also recommends <a href=\"http:\/\/www.nextgov.com\/cybersecurity\/2016\/06\/3-ways-close-social-engineering-security-gap\/128915\/\" target=\"_blank\"><span class=\"s3\">training<\/span><\/a> your workers to be on the lookout for phishing attempts and to let you know when they click on suspected phishing links.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Befriending strangers on social media<\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">There\u2019s another type of phishing your employees should be aware of, especially if they mention your business name on their personal or professional social media accounts. Thieves can create fake profiles, make friend requests, and then monitor posts for information they can use to guess passwords to employees\u2019 personal and business accounts. They can also share links and files that contain malware. If your staffers click on these while using your business network, you\u2019re going to be infected. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\"><a href=\"http:\/\/socialnomics.net\/2016\/01\/13\/4-case-studies-in-fraud-social-media-and-identity-theft\/\" target=\"_blank\">SocialNomics<\/a> <span class=\"s3\">recommends<\/span> that social media users only accept friend requests from people they know. It&#8217;s also a good idea to\u00a0avoid following links or downloading files from strangers on social media.<\/span><\/p>\n<h2 class=\"p3\"><span class=\"s1\">Leaving paper records accessible <\/span><\/h2>\n<p class=\"p2\"><span class=\"s1\">After all this talk about hardware, email and social media, and network security, it may seem odd to wrap things up with paper. However, until the day comes when no employee keeps a work password scrawled on a sticky note and every employee diligently shreds documents before disposal, paper will be a low-tech way for thieves to access your network and sensitive data. <\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">The DBIR recommends that you 'rein in the paper'\u009d as much as you can. Ban workers from posting passwords where they are visible to customers or passersby\/ third-party workers like cleaners and caterers. Make shredding discarded documents a companywide habit.<\/span><\/p>\n<p class=\"p2\"><span class=\"s1\">For more information about small-business success, check out the <a href=\"https:\/\/www.hostgator.com\/blog\/category\/startup-small-business\/\"><span class=\"s3\">Startup &amp; Small Business<\/span><\/a> section of the HostGator blog.<\/span><\/p>\n<p class=\"p2\"><strong>Keep your website protected from malware and data thieves with SiteLock from HostGator. Get a certified SiteLock logo and increase your web conversions by 15%! Learn more <a href=\"https:\/\/www.hostgator.com\/sitelock\">here<\/a>.<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"<p>No matter how careful you are about protecting your business information, there\u2019s always a risk someone will break into your&#8230;<\/p>\n","protected":false},"author":162,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[98],"tags":[],"class_list":["post-11279","post","type-post","status-publish","format-standard","hentry","category-startup-small-business"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Protect Your Data from Your Employees (and Yourself) - HostGator<\/title>\n<meta name=\"description\" content=\"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Protect Your Data from Your Employees (and Yourself)\" \/>\n<meta property=\"og:description\" content=\"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2016-07-21T14:00:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2016-11-22T22:00:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\" \/>\n<meta name=\"author\" content=\"Casey Kelly-Barton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Kelly-Barton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\"},\"author\":{\"name\":\"Casey Kelly-Barton\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\"},\"headline\":\"How to Protect Your Data from Your Employees (and Yourself)\",\"datePublished\":\"2016-07-21T14:00:24+00:00\",\"dateModified\":\"2016-11-22T22:00:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\"},\"wordCount\":932,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\",\"articleSection\":[\"Startup &amp; Small Business\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\",\"name\":\"How to Protect Your Data from Your Employees (and Yourself) - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\",\"datePublished\":\"2016-07-21T14:00:24+00:00\",\"dateModified\":\"2016-11-22T22:00:40+00:00\",\"description\":\"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png\",\"width\":1200,\"height\":600,\"caption\":\"Protect Your Data\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Protect Your Data from Your Employees (and Yourself)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\",\"name\":\"Casey Kelly-Barton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"caption\":\"Casey Kelly-Barton\"},\"description\":\"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention\",\"sameAs\":[\"http:\/\/caseykellybarton.com\/\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Protect Your Data from Your Employees (and Yourself) - HostGator","description":"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/","og_locale":"en_US","og_type":"article","og_title":"How to Protect Your Data from Your Employees (and Yourself)","og_description":"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.","og_url":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2016-07-21T14:00:24+00:00","article_modified_time":"2016-11-22T22:00:40+00:00","og_image":[{"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png"}],"author":"Casey Kelly-Barton","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Casey Kelly-Barton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/"},"author":{"name":"Casey Kelly-Barton","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a"},"headline":"How to Protect Your Data from Your Employees (and Yourself)","datePublished":"2016-07-21T14:00:24+00:00","dateModified":"2016-11-22T22:00:40+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/"},"wordCount":932,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png","articleSection":["Startup &amp; Small Business"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/protect-your-data\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/","url":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/","name":"How to Protect Your Data from Your Employees (and Yourself) - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png","datePublished":"2016-07-21T14:00:24+00:00","dateModified":"2016-11-22T22:00:40+00:00","description":"No matter how careful you are about protecting your business information, there\u00e2\u20ac\u2122s always a risk someone will break in. Protect your data with these tips.","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/protect-your-data\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/06\/Protect-Your-Data.png","width":1200,"height":600,"caption":"Protect Your Data"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/protect-your-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Protect Your Data from Your Employees (and Yourself)"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a","name":"Casey Kelly-Barton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","caption":"Casey Kelly-Barton"},"description":"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention","sameAs":["http:\/\/caseykellybarton.com\/"],"url":"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11279"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=11279"}],"version-history":[{"count":7,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11279\/revisions"}],"predecessor-version":[{"id":13305,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/11279\/revisions\/13305"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=11279"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=11279"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=11279"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}