{"id":23177,"date":"2019-09-16T08:24:13","date_gmt":"2019-09-16T13:24:13","guid":{"rendered":"https:\/\/www.hostgator.com\/blog\/?p=23177"},"modified":"2019-09-16T13:09:10","modified_gmt":"2019-09-16T18:09:10","slug":"identify-cybersecurity-threats-on-website","status":"publish","type":"post","link":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/","title":{"rendered":"How to Identify Cybersecurity Threats on Your Website"},"content":{"rendered":"\n<h4 class=\"wp-block-heading\">43% of All Data Breaches Hit Small Businesses. Here&#8217;s How to Protect Your Site.<\/h4>\n\n\n\n<p>While data breaches at major retailers, hotels, and government agencies make headlines, small business owners are getting hit almost as often as big business. <\/p>\n\n\n\n<p>In 2018, 43% of all data breaches worldwide involved small businesses, according to the Verizon Data Breach Investigations Report. And the consequences can hurt SMBs even more than enterprises.&nbsp;<\/p>\n\n\n\n<p>Why do <a href=\"https:\/\/www.hostgator.com\/blog\/3-easy-steps-that-protect-your-website-from-hackers\/\">hackers<\/a> bother going after small websites when there are so many big fish in the data-breach sea? Experts say it\u2019s because many small-business site owners don\u2019t have the expertise and resources to set up enterprise-level site security. <\/p>\n\n\n\n<p>Criminals know this. And because organized cybercrooks often automate their attacks for efficiency, it\u2019s as easy to go after small sites as large ones.&nbsp;<\/p>\n\n\n\n<p>What does this mean for your site, and how can you protect your business? Let\u2019s take a look.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter\"><a href=\"https:\/\/www.hostgator.com\/managed-wordpress-hosting\"><img loading=\"lazy\" decoding=\"async\" width=\"470\" height=\"60\" src=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Wordpress.png\" alt=\"best WordPress hosting\" class=\"wp-image-18313\" srcset=\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Wordpress.png 470w, https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2017\/12\/Wordpress-300x38.png 300w\" sizes=\"(max-width: 470px) 100vw, 470px\" \/><\/a><\/figure><\/div>\n\n\n\n<h2 class=\"wp-block-heading\">Small Business Cybersecurity Breaches Mean Big Business Losses<\/h2>\n\n\n\n<p><a href=\"https:\/\/www.hostgator.com\/blog\/data-breach-plan\/\">Data breach<\/a> and other hacks can end a small business. Cisco reported in 2018 that 45% of cyberattacks on businesses of all sizes cost more than $500,000 to clean up. Why so much? <\/p>\n\n\n\n<p>When a site goes offline because of a malicious takeover, forget making sales. Customers get scared away, so the site loses future sales. That means the lifetime value of customers goes down and the cost to acquire customers goes up. Partners may back away after a breach, too, causing lost deals and missed opportunities.&nbsp;<\/p>\n\n\n\n<p>Victims also must hire people to fix the site, evict the hackers, and figure out how to keep the hack from happening again. If customer funds or data were stolen, the business needs to make those people whole by covering their losses or providing credit monitoring. <\/p>\n\n\n\n<p>Depending on where the business operates, it may <a href=\"https:\/\/www.hostgator.com\/blog\/legal-requirements-small-business-websites\/\">face fines<\/a>. Lawsuits are possible, too. As Cisco said, the costs are 'enough to put an unprepared small\/midmarket business out of operation-permanently.'\u009d&nbsp;<\/p>\n\n\n\n<p>This disaster scenario is much less likely if your site has rigorous, up-to-date security. Your business doesn\u2019t need to handle this in-house. There are third-party security services that will monitor and even fix your site for you. <\/p>\n\n\n\n<p>But before you can choose your <a href=\"https:\/\/www.hostgator.com\/blog\/benefits-using-website-security-checker\/\">website security tools<\/a>, it\u2019s important to understand the major risks to websites, so you can evaluate the services available to you.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Know the Cybersecurity Threats to Your Website<\/h2>\n\n\n\n<p>Malware, which includes nasty attacks like spyware, worms, and viruses, can find its way into your site through unpatched security holes in your site code. Or it can get in through security gaps in plugins and apps. There\u2019s also something called SQL injection, which installs malware that tricks your site into sharing data with attackers. <\/p>\n\n\n\n<p>When attackers find a way in, they may steal files, redirect traffic from your customers, intercept their data, and even hijack your site to launch phishing attacks on your customers and partners.&nbsp;<\/p>\n\n\n\n<p>Bot attacks are like the drones of cyberattacks. Hackers can deploy them to overwhelm and crash sites (DDoS attacks), exploit site security gaps to steal data, and install ransomware on sites. As for <a href=\"https:\/\/securityboulevard.com\/2019\/06\/why-are-we-seeing-more-ransomware\/\" target=\"_blank\" rel=\"noopener noreferrer\">ransomware attacks-they\u2019re on the rise<\/a>-and they can be devastating. <\/p>\n\n\n\n<p>Unfortunately, they overwhelmingly target small businesses. Last year, <a href=\"https:\/\/healthitsecurity.com\/news\/71-of-ransomware-attacks-targeted-small-businesses-in-2018\" target=\"_blank\" rel=\"noopener noreferrer\">71% of ransomware victims were SMBs<\/a>. The average ransom demand was $116,000.&nbsp;<\/p>\n\n\n\n<p>Ransomware victims are often forced to choose between paying a ransom they can\u2019t afford or going out of business. A 2017 BBB survey found that more than half of small businesses would stop being profitable if they lost access to their data for even one month. Perhaps that\u2019s why more than half of SMBs say they\u2019d pay a ransom to get their data back, according to a cybersecurity report by AppRiver.<\/p>\n\n\n\n<p>So, data theft, customer and partner loss, site shutdown, and unplanned expenses are all part of the risk landscape. A strong security program can help you avoid these problems.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Protect Your Website from Cybersecurity Threats<\/h2>\n\n\n\n<p>The first element in a good website security program is <a href=\"https:\/\/www.hostgator.com\/blog\/backing-website-important\/\"><strong>regular site backups<\/strong><\/a>. <\/p>\n\n\n\n<p>A service like <a href=\"https:\/\/www.hostgator.com\/codeguard-portal\">CodeGuard<\/a> runs daily automatic backups that help you recover fast if your site is hacked. It can also help if you accidentally 'break'\u009d your site during an upgrade, or if your server crashes and takes your site data with it. Rather than have your site offline for hours or days and spend money on emergency tech help, you can revert to the most recent clean version of your site with a mouse click and get back to work.<\/p>\n\n\n\n<p>The second element in your site security program is <strong>constant vigilance<\/strong>. <\/p>\n\n\n\n<p>Services like <a href=\"https:\/\/www.hostgator.com\/sitelock\">SiteLock<\/a> can continuously monitor your site to identify and stop malware, SQL injection attempts and bot attacks. The monitoring service you choose should also scan for security gaps and outdated software to prevent hackers from exploiting those weaknesses.&nbsp;<\/p>\n\n\n\n<p>Besides keeping your site running and protecting your data, site monitoring can keep your website on Google\u2019s good side. That\u2019s because when search engines find malware on a site, they sometimes blacklist it. As you might expect, that\u2019s bad for SEO and your reputation. <\/p>\n\n\n\n<p>But if you have a site monitoring service, not only are you protected from blacklisting, you also get a badge that shows customers you take their data safety seriously. That by itself can make people more likely to buy from you, and to keep coming back because they know your site is safe.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Ready to Secure your Website Against Cybercriminals? <\/h2>\n\n\n\n<p><a href=\"https:\/\/www.hostgator.com\/codeguard-portal\">CodeGuard<\/a> takes snapshots of your site as changes occur, keeping you in the know. It also gives you the opportunity to go back to the most recent pre-change version with one click to minimize interruptions, expense, and downtime. <\/p>\n\n\n\n<p><a href=\"https:\/\/www.hostgator.com\/sitelock\">SiteLock<\/a> scans your site for malware and bot attacks, looks for vulnerabilities that hackers might exploit, and gives you a site badge to show your customers you\u2019re watching out for their data.&nbsp;<\/p>\n\n\n\n<p>HostGator customers can get both of these today. Contact us to learn more.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>43% of All Data Breaches Hit Small Businesses. Here&#8217;s How to Protect Your Site. While data breaches at major retailers,&#8230;<\/p>\n","protected":false},"author":162,"featured_media":22185,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[19],"tags":[124,120],"class_list":["post-23177","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-web-and-hosting-tips","tag-codeguard","tag-shared-hosting"],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v23.2 (Yoast SEO v23.2) - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How to Identify Cybersecurity Threats on Your Website - HostGator<\/title>\n<meta name=\"description\" content=\"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Identify Cybersecurity Threats on Your Website\" \/>\n<meta property=\"og:description\" content=\"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\" \/>\n<meta property=\"og:site_name\" content=\"HostGator\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/HostGator\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-16T13:24:13+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-09-16T18:09:10+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1152\" \/>\n\t<meta property=\"og:image:height\" content=\"604\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Casey Kelly-Barton\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@HostGator\" \/>\n<meta name=\"twitter:site\" content=\"@HostGator\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Casey Kelly-Barton\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\"},\"author\":{\"name\":\"Casey Kelly-Barton\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\"},\"headline\":\"How to Identify Cybersecurity Threats on Your Website\",\"datePublished\":\"2019-09-16T13:24:13+00:00\",\"dateModified\":\"2019-09-16T18:09:10+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\"},\"wordCount\":1005,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png\",\"keywords\":[\"CodeGuard\",\"Shared Hosting\"],\"articleSection\":[\"Web Hosting Tips\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\",\"name\":\"How to Identify Cybersecurity Threats on Your Website - HostGator\",\"isPartOf\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png\",\"datePublished\":\"2019-09-16T13:24:13+00:00\",\"dateModified\":\"2019-09-16T18:09:10+00:00\",\"description\":\"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png\",\"width\":1152,\"height\":604,\"caption\":\"Identify Cyber Security Threats on your Website\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.hostgator.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Identify Cybersecurity Threats on Your Website\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#website\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"name\":\"HostGtaor\",\"description\":\"Web Hosting and Marketing Tips for Entrepreneurs\",\"publisher\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#organization\",\"name\":\"HostGtaor\",\"url\":\"https:\/\/www.hostgator.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"contentUrl\":\"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png\",\"width\":1092,\"height\":215,\"caption\":\"HostGtaor\"},\"image\":{\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/HostGator\",\"https:\/\/x.com\/HostGator\",\"https:\/\/www.instagram.com\/hostgator\",\"https:\/\/www.linkedin.com\/company\/hostgator-com\",\"https:\/\/www.pinterest.com\/hostgator\/\",\"https:\/\/www.youtube.com\/user\/hostgator\"],\"email\":\"support@gator.com\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a\",\"name\":\"Casey Kelly-Barton\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g\",\"caption\":\"Casey Kelly-Barton\"},\"description\":\"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention\",\"sameAs\":[\"http:\/\/caseykellybarton.com\/\"],\"url\":\"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"How to Identify Cybersecurity Threats on Your Website - HostGator","description":"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/","og_locale":"en_US","og_type":"article","og_title":"How to Identify Cybersecurity Threats on Your Website","og_description":"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.","og_url":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/","og_site_name":"HostGator","article_publisher":"https:\/\/www.facebook.com\/HostGator","article_published_time":"2019-09-16T13:24:13+00:00","article_modified_time":"2019-09-16T18:09:10+00:00","og_image":[{"width":1152,"height":604,"url":"https:\/\/www.hostgator.com\/blog\/wp-content\/\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png","type":"image\/png"}],"author":"Casey Kelly-Barton","twitter_card":"summary_large_image","twitter_creator":"@HostGator","twitter_site":"@HostGator","twitter_misc":{"Written by":"Casey Kelly-Barton","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#article","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/"},"author":{"name":"Casey Kelly-Barton","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a"},"headline":"How to Identify Cybersecurity Threats on Your Website","datePublished":"2019-09-16T13:24:13+00:00","dateModified":"2019-09-16T18:09:10+00:00","mainEntityOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/"},"wordCount":1005,"commentCount":0,"publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png","keywords":["CodeGuard","Shared Hosting"],"articleSection":["Web Hosting Tips"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/","url":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/","name":"How to Identify Cybersecurity Threats on Your Website - HostGator","isPartOf":{"@id":"https:\/\/www.hostgator.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage"},"thumbnailUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png","datePublished":"2019-09-16T13:24:13+00:00","dateModified":"2019-09-16T18:09:10+00:00","description":"Last year, nearly half of cybersecurity threats targeted small businesses. What does this mean for your site, and how can you protect your small business? Learn here.","breadcrumb":{"@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#primaryimage","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/05\/Identify-Cyber-Security-Threats-on-your-Website.png","width":1152,"height":604,"caption":"Identify Cyber Security Threats on your Website"},{"@type":"BreadcrumbList","@id":"https:\/\/www.hostgator.com\/blog\/identify-cybersecurity-threats-on-website\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.hostgator.com\/blog\/"},{"@type":"ListItem","position":2,"name":"How to Identify Cybersecurity Threats on Your Website"}]},{"@type":"WebSite","@id":"https:\/\/www.hostgator.com\/blog\/#website","url":"https:\/\/www.hostgator.com\/blog\/","name":"HostGtaor","description":"Web Hosting and Marketing Tips for Entrepreneurs","publisher":{"@id":"https:\/\/www.hostgator.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.hostgator.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.hostgator.com\/blog\/#organization","name":"HostGtaor","url":"https:\/\/www.hostgator.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","contentUrl":"https:\/\/www.hostgator.com\/blog\/wp-content\/uploads\/2019\/04\/cropped-HG-Logo_default-default.png","width":1092,"height":215,"caption":"HostGtaor"},"image":{"@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/HostGator","https:\/\/x.com\/HostGator","https:\/\/www.instagram.com\/hostgator","https:\/\/www.linkedin.com\/company\/hostgator-com","https:\/\/www.pinterest.com\/hostgator\/","https:\/\/www.youtube.com\/user\/hostgator"],"email":"support@gator.com"},{"@type":"Person","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/4c68d74801037eb3f313d8a456d6506a","name":"Casey Kelly-Barton","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.hostgator.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/65d330a9fbb7308264432649d5324f2b?s=96&d=mm&r=g","caption":"Casey Kelly-Barton"},"description":"Casey Kelly-Barton is an Austin-based freelance B2B content marketing writer. Her specialty areas include SMB marketing and growth, data security, IoT, and fraud prevention","sameAs":["http:\/\/caseykellybarton.com\/"],"url":"https:\/\/www.hostgator.com\/blog\/author\/caseykb\/"}]}},"_links":{"self":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23177"}],"collection":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/users\/162"}],"replies":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/comments?post=23177"}],"version-history":[{"count":3,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23177\/revisions"}],"predecessor-version":[{"id":23654,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/posts\/23177\/revisions\/23654"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media\/22185"}],"wp:attachment":[{"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/media?parent=23177"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/categories?post=23177"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.hostgator.com\/blog\/wp-json\/wp\/v2\/tags?post=23177"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}