{"id":13468,"date":"2025-04-12T12:59:35","date_gmt":"2025-04-12T07:29:35","guid":{"rendered":"https:\/\/protegent360.com\/blog\/?p=13468"},"modified":"2025-04-12T13:10:37","modified_gmt":"2025-04-12T07:40:37","slug":"restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections","status":"publish","type":"post","link":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/","title":{"rendered":"Website Security: Is Your Business at Risk?"},"content":{"rendered":"<p>Let\u2019s be real for a second \u2014 cyber threats today aren\u2019t just an \u201cIT department issue.\u201d They\u2019re a <strong>full-blown business crisis<\/strong> waiting to happen.<\/p>\n<p>You might think your business is too small to be on a hacker&#8217;s radar or that your remote team has things under control. But here\u2019s the truth: if your website is live, your data is online, and your team uses devices to connect \u2014 <strong>you\u2019re already a target<\/strong>.<\/p>\n<p>And the numbers back it up.<\/p>\n<p>According to the <span style=\"color: #0000ff;\"><strong>2024 Cybersecurity Almanac<\/strong><\/span>, cybercrime will cost the world <span style=\"color: #0000ff;\"><strong>$9.5 trillion in damages<\/strong><\/span> this year \u2014 that\u2019s more than the global trade of all major illegal drugs combined. And get this: <strong>a cyberattack occurs every 39 seconds<\/strong>.<\/p>\n<p>For small and mid-sized businesses, the situation is even more chilling. A recent <strong>Verizon Data Breach Investigation Report<\/strong> found that:<\/p>\n<ul>\n<li><span style=\"color: #0000ff;\"><strong>43% of all data breaches target small businesses<\/strong>.<\/span><\/li>\n<li><strong><span style=\"color: #0000ff;\">74% of these breaches involve the human element<\/span>, <\/strong>like\u00a0clicking a bad link or using a weak password.<\/li>\n<li>The <span style=\"color: #0000ff;\"><strong>average downtime from a ransomware attack is 21 days<\/strong><\/span>, and many businesses never fully recover.<\/li>\n<\/ul>\n<p>So if you\u2019re thinking, <em>\u201cWe\u2019re probably fine,\u201d<\/em> it might be time to rethink that.<\/p>\n<p>Your <strong>website isn\u2019t just a homepage<\/strong> \u2014 it\u2019s a virtual front door. And just like in the real world, if you don\u2019t lock it properly, someone can walk right in, steal what they want, and leave you to clean up the mess.<\/p>\n<p><strong>\u00a0<\/strong><\/p>\n<h3><strong>The New Cyber Reality<\/strong><\/h3>\n<p>The shift to remote work during the pandemic? It was a blessing in many ways, but it also opened many digital doors. Cybercriminals noticed \u2014 and they didn\u2019t waste time walking right through them. According to IBM\u2019s 2024 report, <span style=\"color: #0000ff;\"><strong>the average cost of a data breach is now $4.45 million<\/strong> <\/span>\u2014 the highest it&#8217;s ever been. And small businesses aren&#8217;t flying under the radar either. A whopping <span style=\"color: #0000ff;\"><strong>43% of cyberattacks target small businesses<\/strong><\/span>, mostly because they&#8217;re easier to hit.<\/p>\n<p>Let\u2019s break down some of the biggest website and cybersecurity risks businesses are facing today \u2014 and how you can fight back.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>1. Ransomware: Hold Your Data Hostage<\/strong><\/h4>\n<p>Ransomware is brutal. It locks you out of your system and demands payment, usually in crypto \u2014 to get your files back. In some cases, even paying the ransom doesn\u2019t guarantee recovery.<\/p>\n<p>In 2021, <span style=\"color: #0000ff;\"><strong>80% of global businesses reported some form of ransomware attack<\/strong><\/span>. Fast forward to 2024, and now we\u2019re seeing an average <span style=\"color: #0000ff;\"><strong>ransom payout of over $2 million<\/strong><\/span>. That\u2019s not a typo.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li><strong>Layer your security<\/strong>: Don\u2019t just rely on one tool. Use antivirus, firewalls, email filters, and endpoint protection together.<\/li>\n<li><strong>Back it up<\/strong>: Keep secure, offline backups of all your data. And yes, test them regularly.<\/li>\n<li><strong>Revisit remote policies<\/strong>: If employees use their own devices (BYOD), make sure they\u2019re secured \u2014 or better yet, use company-issued devices with a VPN.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>2. Phishing: It\u2019s Not Just Spam Anymore<\/strong><\/h4>\n<p>Phishing has come a long way from those \u201cYou\u2019ve won a million dollars!\u201d emails. These days, cybercriminals are smart. They do their homework and tailor attacks \u2014 also called <strong>spear phishing<\/strong> \u2014 to make them look legit.<\/p>\n<p>Fake emails from \u201cvendors,\u201d bogus invoices, even voice phishing (\u201cvishing\u201d) are all fair game.\u00a0<span style=\"color: #0000ff;\"><span style=\"box-sizing: border-box; margin: 0px; padding: 0px;\"><strong>Over<\/strong><\/span><strong>\u00a080% of reported security incidents involve phishing<\/strong>.<\/span><\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li><strong>Scrub your digital footprint<\/strong>: Avoid listing full names, contact info, and emails publicly.<\/li>\n<li><strong>Use email filters<\/strong>: They\u2019re not bulletproof, but they reduce risk.<\/li>\n<li><strong>Train your team<\/strong>: If an email feels off \u2014 rushed tone, strange link, weird grammar \u2014 it probably is. And always check if that URL starts with \u201cHTTPS.\u201d<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>3. Weak Passwords: The Digital Skeleton Key<\/strong><\/h4>\n<p>Let\u2019s be honest \u2014 we\u2019ve all reused a password at some point. But for businesses, it\u2019s a ticking time bomb. Hackers use <strong>brute-force tools<\/strong> to guess credentials, and if one works, chances are it\u2019ll work on five other apps too.<\/p>\n<p>According to a 2024 report, <strong>19% of enterprise professionals still use easy or recycled passwords<\/strong>. That\u2019s all a hacker needs.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li><strong>Enforce strong password policies<\/strong>: At least 15 characters, mixed types, and changed regularly.<\/li>\n<li><strong>Get a password manager<\/strong>: No more Post-it notes or \u201cPassword123.\u201d<\/li>\n<li><strong>Turn on MFA<\/strong>: Multi-Factor Authentication adds a second layer (like a code to your phone) \u2014 a game-changer for security.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>4. Mobile Devices: Business On-the-Go, Risk On-the-Rise<\/strong><\/h4>\n<p>With more work being done on phones and tablets, the security gap has widened. These devices leave the safety of your network and can be lost, stolen, or compromised without you even knowing.<\/p>\n<p>And here\u2019s the kicker: <span style=\"color: #0000ff;\"><strong>mobile banking malware is up 50%<\/strong><\/span>, and many businesses still don\u2019t have mobile protection policies in place.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li><strong>Enable device encryption<\/strong> and screen locks (PINs, biometrics, etc.).<\/li>\n<li><strong>Track and wipe<\/strong>: All devices should be remotely wipeable if lost.<\/li>\n<li><strong>Update software<\/strong> regularly and backup mobile data too.<\/li>\n<li><strong>Create a mobile security policy<\/strong>: Set expectations, get sign-offs, and update them regularly.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>5. Human Error: Still the #1 Threat<\/strong><\/h4>\n<p>We\u2019d love to blame hackers for everything, but sometimes the problem is\u2026 well, us. Clicking the wrong link. Sending sensitive info to the wrong person. Writing a password on a sticky note.<\/p>\n<p>IBM reports that <strong>74% of breaches come down to human error<\/strong>. So it\u2019s not just about tech \u2014 it\u2019s about culture.<\/p>\n<p><strong>What you can do:<\/strong><\/p>\n<ul>\n<li><strong>Offer cybersecurity training<\/strong> (and keep it fresh \u2014 no snoozy slide decks).<\/li>\n<li><strong>Minimise access<\/strong>: Only give employees access to what they need.<\/li>\n<li><strong>Reduce password fatigue<\/strong>: Fewer logins, smarter tools, and biometrics where possible.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>Bonus Risk: Outdated Systems<\/strong><\/h4>\n<p>Still running software from 2015? It might be full of security holes. Hackers love unpatched systems. Make sure your CMS (like WordPress), plugins, and operating systems are all up to date.<\/p>\n<p>&nbsp;<\/p>\n<h4><strong>So, What\u2019s the Fix?<\/strong><\/h4>\n<p>There\u2019s no silver bullet \u2014 but there <em>are<\/em> all-in-one solutions that help you stay ahead of threats without needing a dedicated IT army.<\/p>\n<h3><strong>Meet Protegent Total Security<\/strong><\/h3>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-13470 size-full\" src=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Total-Security.png\" alt=\"\" width=\"873\" height=\"514\" srcset=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Total-Security.png 873w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Total-Security-300x177.png 300w, https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Total-Security-768x452.png 768w\" sizes=\"auto, (max-width: 873px) 100vw, 873px\" \/><\/p>\n<p>If you\u2019re looking for comprehensive protection that goes beyond just <a href=\"https:\/\/protegent360.com\/antivirus\"><strong>antivirus<\/strong><\/a>, <a href=\"https:\/\/protegent360.com\/total-security\"><strong>Protegent Total Security<\/strong><\/a> covers all the bases:<\/p>\n<ul>\n<li><strong>Ransomware protection: <\/strong>Safeguards your personal files from unauthorised access, modifications, or encryption by malicious actors, ensuring your data remains secure.<\/li>\n<li>\u00a0<strong>Cloud protection and backup: <\/strong>Utilises cloud technology to securely store and protect your files and documents, defending against ransomware, malware, and potential data theft.<\/li>\n<li>\u00a0<strong>Web control to block dangerous sites:<\/strong> <span class=\"relative -mx-px my-[-0.2rem] rounded px-px py-[0.2rem] transition-colors duration-100 ease-in-out\">Restricts access to risky websites, preventing exposure to harmful content and reducing the risk of identity theft and malware infections.<\/span><\/li>\n<li>\u00a0<strong>Safe online transactions: <\/strong>Ensures secure internet banking, online shopping, and other financial transactions, protecting your sensitive financial information from cyber threats.<\/li>\n<li>\u00a0<strong>Parental &amp; employee monitoring:<\/strong> Allows monitoring and controlling internet usage, helping to restrict access to inappropriate content and manage time spent online, promoting safe browsing practices.<\/li>\n<li>\u00a0<strong>Data loss prevention: <\/strong>Incorporates proactive data recovery features, protecting against data loss scenarios caused by accidental deletion, system crashes, or other unforeseen events.<\/li>\n<li>\u00a0<strong>Firewall and network monitoring: <\/strong>Employs an advanced bidirectional firewall to monitor and control both incoming and outgoing network traffic, blocking unauthorised access and potential threats.<\/li>\n<li>\u00a0<strong>30% more features than typical antivirus tools: <\/strong>Offers additional functionalities beyond standard antivirus solutions, providing enhanced protection and a comprehensive security suite to meet diverse user needs.<\/li>\n<\/ul>\n<p>Basically, it does what your business needs \u2014 <strong>without breaking the bank or drowning you in tech jargon<\/strong>.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Final Thought<\/strong><\/h3>\n<p>You don\u2019t have to be a cybersecurity expert to protect your business \u2014 but you do have to stay alert. Start with the basics, build good habits, and invest in the right tools.<\/p>\n<p>Because the question isn&#8217;t <em>if<\/em> your website will be targeted \u2014 it\u2019s <em>when<\/em>. The good news? You can be ready with <strong>Protegent<\/strong>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Let\u2019s be real for a second \u2014 cyber threats today aren\u2019t just an \u201cIT department issue.\u201d They\u2019re a full-blown business crisis waiting to happen. You might think your business is too small to be on a hacker&#8217;s radar or that your remote team has things under control. But here\u2019s the truth: if your website is live, your data is online, and your team uses devices to connect \u2014 you\u2019re already a target. And the numbers back it up. According to the 2024 Cybersecurity Almanac, cybercrime will cost the world $9.5 trillion in damages this year \u2014 that\u2019s more than the global trade of all major illegal drugs combined. And get this: a cyberattack occurs every 39 seconds. For small and mid-sized businesses, the situation is even more chilling. A recent Verizon Data Breach Investigation Report found that: 43% of all data breaches target small businesses. 74% of these breaches involve [&hellip;]<\/p>\n","protected":false},"author":34,"featured_media":13469,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[106],"tags":[],"class_list":["post-13468","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-our-total-security-software"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v19.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Website Security: Is Your Business at Risk? - Our Blog<\/title>\n<meta name=\"description\" content=\"protection that goes beyond just antivirus, Protegent Total Security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Website Security: Is Your Business at Risk? - Our Blog\" \/>\n<meta property=\"og:description\" content=\"protection that goes beyond just antivirus, Protegent Total Security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/\" \/>\n<meta property=\"og:site_name\" content=\"Our Blog\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/UnistalGlobal\" \/>\n<meta property=\"article:published_time\" content=\"2025-04-12T07:29:35+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-04-12T07:40:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Website-risk.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1212\" \/>\n\t<meta property=\"og:image:height\" content=\"642\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Survi\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@https:\/\/twitter.com\/UnistalGlobal\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Survi\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/protegent360.com\/blog\/#website\",\"url\":\"https:\/\/protegent360.com\/blog\/\",\"name\":\"Our Blog\",\"description\":\"World&#039;s Only Antivirus with Data Recovery Software\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/protegent360.com\/blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/\",\"url\":\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/\",\"name\":\"Website Security: Is Your Business at Risk? - Our Blog\",\"isPartOf\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#website\"},\"datePublished\":\"2025-04-12T07:29:35+00:00\",\"dateModified\":\"2025-04-12T07:40:37+00:00\",\"author\":{\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7\"},\"description\":\"protection that goes beyond just antivirus, Protegent Total Security\",\"breadcrumb\":{\"@id\":\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/protegent360.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Website Security: Is Your Business at Risk?\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7\",\"name\":\"Survi\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g\",\"caption\":\"Survi\"},\"sameAs\":[\"https:\/\/protegent360.com\/\",\"https:\/\/www.facebook.com\/UnistalGlobal\",\"https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd\",\"https:\/\/twitter.com\/https:\/\/twitter.com\/UnistalGlobal\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Website Security: Is Your Business at Risk? - Our Blog","description":"protection that goes beyond just antivirus, Protegent Total Security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/","og_locale":"en_US","og_type":"article","og_title":"Website Security: Is Your Business at Risk? - Our Blog","og_description":"protection that goes beyond just antivirus, Protegent Total Security","og_url":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/","og_site_name":"Our Blog","article_author":"https:\/\/www.facebook.com\/UnistalGlobal","article_published_time":"2025-04-12T07:29:35+00:00","article_modified_time":"2025-04-12T07:40:37+00:00","og_image":[{"width":1212,"height":642,"url":"https:\/\/protegent360.com\/blog\/wp-content\/uploads\/2025\/04\/Website-risk.jpg","type":"image\/jpeg"}],"author":"Survi","twitter_card":"summary_large_image","twitter_creator":"@https:\/\/twitter.com\/UnistalGlobal","twitter_misc":{"Written by":"Survi","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/protegent360.com\/blog\/#website","url":"https:\/\/protegent360.com\/blog\/","name":"Our Blog","description":"World&#039;s Only Antivirus with Data Recovery Software","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/protegent360.com\/blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/","url":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/","name":"Website Security: Is Your Business at Risk? - Our Blog","isPartOf":{"@id":"https:\/\/protegent360.com\/blog\/#website"},"datePublished":"2025-04-12T07:29:35+00:00","dateModified":"2025-04-12T07:40:37+00:00","author":{"@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7"},"description":"protection that goes beyond just antivirus, Protegent Total Security","breadcrumb":{"@id":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/protegent360.com\/blog\/restricts-access-to-risky-websites-preventing-exposure-to-harmful-content-and-reducing-the-risk-of-identity-theft-and-malware-infections\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/protegent360.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Website Security: Is Your Business at Risk?"}]},{"@type":"Person","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/20de76dd45afab8021b34158191d77c7","name":"Survi","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/protegent360.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/dbc58f88815822bcca0eed40f57479befac47a388a2e89d7f40adf29cfaf494b?s=96&d=mm&r=g","caption":"Survi"},"sameAs":["https:\/\/protegent360.com\/","https:\/\/www.facebook.com\/UnistalGlobal","https:\/\/www.linkedin.com\/company\/unistal-systems-pvt-ltd","https:\/\/twitter.com\/https:\/\/twitter.com\/UnistalGlobal"]}]}},"_links":{"self":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/13468","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/users\/34"}],"replies":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/comments?post=13468"}],"version-history":[{"count":7,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/13468\/revisions"}],"predecessor-version":[{"id":13480,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/posts\/13468\/revisions\/13480"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media\/13469"}],"wp:attachment":[{"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/media?parent=13468"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/categories?post=13468"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/protegent360.com\/blog\/wp-json\/wp\/v2\/tags?post=13468"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}