{"id":18707,"date":"2018-02-27T18:52:26","date_gmt":"2018-02-27T23:52:26","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=18707"},"modified":"2018-03-22T18:06:30","modified_gmt":"2018-03-22T23:06:30","slug":"cloud-hosting-security","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/","title":{"rendered":"Understanding Cloud Hosting Security"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-18718\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\" alt=\"cloud hosting security\" width=\"1199\" height=\"628\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png 1199w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security-300x157.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security-768x402.png 768w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security-1024x536.png 1024w\" sizes=\"(max-width: 1199px) 100vw, 1199px\" \/><\/p>\n<h2>Understanding Cloud Hosting Security<\/h2>\n<p><a href=\"https:\/\/www.hostgator.com\/cloud-hosting\">Cloud hosting<\/a> is just as secure as any other style of hosting. However, it\u2019s gotten a bad rap due to the criticism of virtualized technologies in the past. When things started moving towards the cloud there was a lot of fear related to this new technology, as businesses couldn\u2019t part with the idea of not having their data and storage in-house.<\/p>\n<p>However, now that the cloud has gone mainstream those critiques have become nothing but a thing of the past. Today we rely on several different technologies that live in the cloud, and our hosting is no different.<\/p>\n<p>Below we explore the main issues surrounding cloud hosting security and highlight the security advantages of hosting your website in the cloud. So you can finally answer the question: <strong>is cloud hosting safe and secure?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<h2>Understanding Cloud Hosting Security<\/h2>\n<p>Much of the concern related to the security of <a href=\"https:\/\/www.hostgator.com\/blog\/what-is-cloud-hosting\/\">cloud hosting<\/a> and other cloud platforms had to do with the initial skepticism over changing technology and not the technology itself. Time has shown us that the cloud has matured and with that technology, maturation has come improved levels of security.<\/p>\n<p>When looking at a traditional server environment your website\u2019s files are stored in a specified physical server location. With cloud hosting your site\u2019s files are distributed and take up multiple virtual server locations that are associated with physical servers.<\/p>\n<p>In terms of overall security, cloud hosting actually has an additional layer of security. You have your physical security measures to protect the physical datacenter from being hacked, or harmed. Next, you have a layer of security on the physical server itself. Finally, with cloud hosting you have an additional layer of security that protects the virtual network and isolates your cloud hosting environment.<\/p>\n<p>However, not all cloud hosts are created equal in their security measures. The overall security of any cloud platform has to do with how certain security protocols are implemented. For example, you can have a very insecure cloud server in the same way you could have an insecure dedicated server. It\u2019s not the underlying technology, but how it\u2019s implemented.<\/p>\n<p>&nbsp;<\/p>\n<h2>Is Cloud Hosting Secure?<\/h2>\n<p>There are a few different objections to the overall security of cloud hosting. We examine those below and illustrate how cloud hosting actually overcomes these security hurdles.<\/p>\n<p>&nbsp;<\/p>\n<h3>1. The Bad Neighbor Effect<\/h3>\n<p>One common security issue revolves around the issue of multi-tenant cloud hosting. This is when multiple different virtual machines are using the same dedicated physical server space. These virtual machine networks are what make up your cloud hosting environment.<\/p>\n<p>The idea is that a single insecure or overloaded site on the network, could compromise the other sites. However, there are numerous enhanced security protocols in place like VM isolation, which completely isolates your virtual network from others on the same machine. This means that your data is safe, protected, and can\u2019t be accessed by anyone except you.<\/p>\n<p>&nbsp;<\/p>\n<h3>2. Overall Loss of Data Control<\/h3>\n<p>The seeming loss of control over the location of your data seems to be a big objection to cloud hosting. The outsourcing of your information storage to a third-party cloud system can seem a little scary. However, most of today\u2019s cloud hosting providers operate with this understanding and have built their system around providing transparency and security around the user data. This allows you to maintain responsibility over your data, while not having to manage everything yourself.<\/p>\n<p>&nbsp;<\/p>\n<h3>3. Main Cloud Hosting Security Vulnerabilities<\/h3>\n<p>Just like other forms of hosting there are certain vulnerabilities you\u2019ll need to be aware of. Security is never going to be perfect. When compared to traditional hosting the cloud offers a universal access point, which means that security protocols need to be even stricter. Still, vulnerabilities do exist.<\/p>\n<p>Below you\u2019ll find the main types of security issues that threaten cloud hosting environments. You\u2019ll notice they\u2019re very similar to traditional hosting environments as well:<\/p>\n<ul>\n<li><b>DDoS attacks.<\/b> It\u2019s difficult to stop DDoS attacks, but you can do your best to protect your site with a solution like SiteLock, or other security add-ons.<\/li>\n<li><b>Data breaches.<\/b> Data breaches can occur due to the lack of two-factor authentication. By improving passwords and improving your user authentication process, this can be avoided.<\/li>\n<li><b>Malware.<\/b> Malware scripts can be injected into your cloud hosting and can be quite destructive in regards to sensitive data. However, using software like <a href=\"https:\/\/www.hostgator.com\/sitelock\">SiteLock<\/a> will help protect you against this as well.<\/li>\n<li><b>Data loss.<\/b> Since data is stored across long distances you can run into the risk of a datacenter being taken out, or going offline, due to natural causes. Typically, this risk can be mitigated through regular backups stored in different locations.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Security Benefits of Cloud Servers<\/h2>\n<p>Using cloud hosting can actually end up offering you flexibility, security, and other <a href=\"https:\/\/www.hostgator.com\/blog\/benefits-cloud-hosting\/\">cloud hosting benefits<\/a>. By taking your website\u2019s hosting up into the cloud you may be protecting your website even more than using a standard host.<\/p>\n<ul>\n<li><b>Hardware problems are a non-issue<\/b>. With cloud hosting, if there\u2019s an issue with the physical server, or you need to add more memory or make improvements, you can do this without any downtime by running your site from a different virtual server.<\/li>\n<li><b>An infected server won\u2019t bring down your site.<\/b> On the same line of thinking if a physical server becomes compromised this won\u2019t bring down your site. Your site will simply be loaded from a different source and isolated from the issue.<\/li>\n<li><b>Instant website data mirroring.<\/b> Website mirroring will have simultaneous versions of your site present on different servers. This helps to improve the overall safety of your site and its redundancy.<\/li>\n<\/ul>\n<p>Hopefully, this post has given you a better picture of the main issues surrounding cloud hosting security. Today\u2019s cloud hosts are very different from the insecure cloud environments of the past, and instead <a href=\"https:\/\/www.hostgator.com\/cloud-hosting\">offer you a flexible and highly secure hosting solution<\/a>.<\/p>\n<p><a href=\"https:\/\/www.hostgator.com\/cloud-hosting\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-medium wp-image-10234\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/01\/HG_Banners_1200x628_v1-300x157.png\" alt=\"HostGator Cloud Sites Banner\" width=\"300\" height=\"157\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/01\/HG_Banners_1200x628_v1-300x157.png 300w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/01\/HG_Banners_1200x628_v1-1024x536.png 1024w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/01\/HG_Banners_1200x628_v1-900x471.png 900w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2016\/01\/HG_Banners_1200x628_v1.png 1200w\" sizes=\"(max-width: 300px) 100vw, 300px\" \/><\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Understanding Cloud Hosting Security Cloud hosting is just as secure as any other style of hosting. However, it\u2019s gotten a&#8230;<\/p>\n","protected":false},"author":144,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[],"class_list":["post-18707","post","type-post","status-publish","format-standard","hentry","category-web-and-hosting-tips"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Understanding Cloud Hosting Security - HostGator<\/title>\n<meta name=\"description\" content=\"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Understanding Cloud Hosting Security\" \/>\n<meta property=\"og:description\" content=\"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2018-02-27T23:52:26+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2018-03-22T23:06:30+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\" \/>\n<meta name=\"author\" content=\"Kevin Wood\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kevin Wood\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\"},\"author\":{\"name\":\"Kevin Wood\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/85675aae4bde46f0f85654ce61827f5a\"},\"headline\":\"Understanding Cloud Hosting Security\",\"datePublished\":\"2018-02-27T23:52:26+00:00\",\"dateModified\":\"2018-03-22T23:06:30+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\"},\"wordCount\":999,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\",\"articleSection\":[\"Web Hosting Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\",\"name\":\"Understanding Cloud Hosting Security - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\",\"datePublished\":\"2018-02-27T23:52:26+00:00\",\"dateModified\":\"2018-03-22T23:06:30+00:00\",\"description\":\"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png\",\"width\":1199,\"height\":628,\"caption\":\"cloud hosting security\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Understanding Cloud Hosting Security\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/85675aae4bde46f0f85654ce61827f5a\",\"name\":\"Kevin Wood\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/d7cbad8d9629880a36824203604a8916?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/d7cbad8d9629880a36824203604a8916?s=96&d=mm&r=g\",\"caption\":\"Kevin Wood\"},\"description\":\"Kevin Wood writes about technology and human potential. You can find him at his virtual homes Wooden Writing and Counter Culturist.\",\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/kwood\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Understanding Cloud Hosting Security - HostGator","description":"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/","og_locale":"en_US","og_type":"article","og_title":"Understanding Cloud Hosting Security","og_description":"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!","og_url":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2018-02-27T23:52:26+00:00","article_modified_time":"2018-03-22T23:06:30+00:00","og_image":[{"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png"}],"author":"Kevin Wood","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Kevin Wood","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/"},"author":{"name":"Kevin Wood","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/85675aae4bde46f0f85654ce61827f5a"},"headline":"Understanding Cloud Hosting Security","datePublished":"2018-02-27T23:52:26+00:00","dateModified":"2018-03-22T23:06:30+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/"},"wordCount":999,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png","articleSection":["Web Hosting Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/","url":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/","name":"Understanding Cloud Hosting Security - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png","datePublished":"2018-02-27T23:52:26+00:00","dateModified":"2018-03-22T23:06:30+00:00","description":"When choosing a hosting provider, security is usually at the top of the list for considerations. Find out if cloud hosting is secure!","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2018\/02\/cloud-hosting-security.png","width":1199,"height":628,"caption":"cloud hosting security"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/cloud-hosting-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Understanding Cloud Hosting Security"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/85675aae4bde46f0f85654ce61827f5a","name":"Kevin Wood","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/d7cbad8d9629880a36824203604a8916?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d7cbad8d9629880a36824203604a8916?s=96&d=mm&r=g","caption":"Kevin Wood"},"description":"Kevin Wood writes about technology and human potential. You can find him at his virtual homes Wooden Writing and Counter Culturist.","url":"https:\/\/www.hostgator.com\/blog\/author\/kwood\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/18707"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/144"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=18707"}],"version-history":[{"count":5,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/18707\/revisions"}],"predecessor-version":[{"id":18960,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/18707\/revisions\/18960"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=18707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=18707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=18707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}