{"id":1102,"date":"2024-05-08T09:36:41","date_gmt":"2024-05-08T09:36:41","guid":{"rendered":"https:\/\/cwatch.comodo.com\/blog\/?p=1102"},"modified":"2024-05-28T18:55:14","modified_gmt":"2024-05-28T18:55:14","slug":"website-security-myths-to-avoid","status":"publish","type":"post","link":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/","title":{"rendered":"Website Security Myths to avoid"},"content":{"rendered":"<p>The evolution of Internet has changed the way of our day to day living \u00e2\u20ac\u201c digitising our regular personal, banking, shopping activities and what not that involves sharing sensitive information over the virtual platform. This creates an itch for the bad guys from the netherworld to steal data for monetary returns.<\/p>\n<p>Earlier cyber-crimes were not so threatening and it was not much bothersome as well &#8211; however scenes have changed in the recent past and cyber-crime has to be looked into and is not to be neglected. Some of the private sectors have seen massive data breaches of late.<\/p>\n<p>It&#8217;s a considerable measure to engulf, and it&#8217;s not going any place at any point in the near future.So what are a few stages you can take to remain safe? Here are the top 5 website security myths that should be left:<\/p>\n<p><strong>5.) Hackers do not target Small Business Owners<\/strong><\/p>\n<p>Experts with statistical evidences in the industry say that small-sized businesses are not targeted by the hackers much. However, in reality, this is a misleading information. Considering the same, small businesses are much at a higher risk and it passes down to resources.<\/p>\n<p>Programmers realize that while bigger organizations could make more lucrative targets, they&#8217;re likewise more very much secured and less demanding to get found hacking. Small-sized organizations may do not have those same level of security assets making them steadier targets. Try not to trick yourself into a belief that you&#8217;re too little to get hacked. You&#8217;re definitely not.<\/p>\n<p><strong>4.) Your Employees Can&#8217;t Interfere with Your Network or Website Security<\/strong><\/p>\n<p>While I feel like this myth has been completely exposed, clearly a few organizations still don&#8217;t understand that their workers are really one of the greatest dangers to their system and site well-being. That is not said malevolently in regards to your workers, either. It&#8217;s simply that there are higher chances for the employees to create ways through periodic episodes of carelessness.<\/p>\n<p>Misconception of the employees, to assume that enough <a href=\"https:\/\/cwatch.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">website malware protection<\/a> has been done from an organization in regards to security like the firewall and spam channels. In addition, if a spam mail comes from a colleague, any employee tends to trust the mail or link to be genuine and so lets them instantly click on the suspicious link or open the malicious mail. It&#8217;s the state of employees being ignorant or not given proper training on how well they are ready to stay away and defy any threats and yet numerous workers don&#8217;t understand that they could endanger their organization by just clicking the wrong attachment unintentionally.<\/p>\n<p>Be that as it may, no doubt about it, your employees are the biggest threat. It is better not to conclude that employees comprehend the complexities of web security by themselves, ensure to train them on the security measures, converse with them about it consistently. What&#8217;s more, be sensible about what you can and can&#8217;t sensibly expect of the employees from a security angle.<\/p>\n<p><strong>3.) A Firewall and Antivirus Software is Enough<\/strong><\/p>\n<p>Tragically, those days are finished. We&#8217;re entering a period of complete web security as an administration. You&#8217;re as of now observing various significant players like Venafi and Comodo move into that space and it&#8217;s difficult to contend with the new innovation&#8217;s advantages. First of all, the cost of staffing a viable in-house security group, for organisations of all sizes, is astonishing. We&#8217;re talking acquiring equipment, employing and preparing staff and managing up everything all alone.<\/p>\n<p>SaaS items are helping organisations and associations to stay away from those expenses by basically out-sourcing everything. That is on account of these days you require something beyond a straightforward firewall and some antivirus programming. You require consistent monitoring, malware identification and expulsion, it&#8217;s most likely shrewd to have a decent CDN for better security and execution, in addition to it you&#8217;ll need a Systems Incident and Events Management group for any significant emergencies.<\/p>\n<p>A Firewall and <a href=\"https:\/\/antivirus.comodo.com\/\" target=\"_blank\" rel=\"noopener noreferrer\">Antivirus Software<\/a> is never again enough, it&#8217;s a great opportunity to put resources into security-as-a-service.<\/p>\n<p><strong>2.) You are too sure that your Password is difficult to hack<\/strong><\/p>\n<p>How is it that the web can gather and settle on an arrangement of guidelines for something as insignificant as the correct request of fixings on a burger emoticon, however building up reliable measures for good password is failed to attain? On the off chance that you do some exploration on passwords you&#8217;ll read an entire pack of irregular counsel that all appears to be a paradox itself.<\/p>\n<p>How about we begin with what not to do: don&#8217;t pick something simple and utilize it for the majority of your online accounts. This is not difficult to implement. What&#8217;s more, who needs to recall a group of various passwords for various accounts? This is what I&#8217;ll say, understanding that I&#8217;m not going to be strict to utilize diverse passwords, ensure the one you do utilize is significantly hard to figure. What&#8217;s more, not simply by a man, but rather by a beast compel assailant. I go for long irregular series of numbers, letters and images. Ensure that you do not use words all together.<\/p>\n<p>In case you&#8217;re reusing passwords, anybody that takes yours approaches the various accounts that has the same password. For organisations, the better arrangement is simply to utilize a secret word generator to secure your site.<\/p>\n<p>Additionally, don&#8217;t stop with passwords. Continuously empower two-factor verification. I&#8217;m not going to mislead you, 2FA includes extra advances and can even be viewed as\u00e2\u20ac\u00a6 irritating. But on the other hand it&#8217;s a critical layer of protection with unique pass-codes that goes invalid after a certain time limit and is specific to a certain user.<\/p>\n<p><strong>1.) If you don&#8217;t store clients&#8217; Mastercard data, you needn&#8217;t bother with a SSL\/TLS Certificate<\/strong><\/p>\n<p>Truly, it&#8217;s valid that SSL was at one time an item outlined more for online business and sites that gathered individual data. That is on the grounds that a SSL Certificate is basically a bit of programming that you introduce on a web server to ensure correspondence. Once introduced and arranged legitimately, the authentication upholds secure HTTPS associations that keep the information being transmitted inside from being stolen or controlled.<\/p>\n<p>You could perceive any reason why this kind of thing would be imperative for money related transactions and medicinal records. All things considered, the programs \u00e2\u20ac\u201c drove by Google and Mozilla \u00e2\u20ac\u201c have verified that HTTPS ought to be the new standard for the web. Or on the other hand, to put it another way, all the organisations are concerned about their websites being encrypted with HTTPS so as to protect the users&#8217; sensitive information and the general population that view them ought to be encoded\u00e2\u20ac\u201dthey should all be secure.<\/p>\n<p>It bodes well, but on the other hand it will cause a genuinely enormous move on the internet. Considering the present scenario, the exploration depends on how well the internet is encoded, however, a sizeable piece of the web isn&#8217;t as of now utilizing a SSL encryption. Furthermore, that will end up being an issue at some point around March or April when Google Chrome starts to stamp any site as yet making HTTP associations as &#8220;Not Secure.&#8221;<\/p>\n<p>Paying little heed to what sort of individual data you&#8217;re putting away and preparing, you have to include a SSL\/TLS Certificate to your site.<\/p>\n<p><a href=\"https:\/\/cwatch.comodo.com\/onboard-buyer-journey\/?product_plan=pro&amp;track=10110\u00c2\u00a4cy=usd&amp;af=10110\" target=\"_blank\" rel=\"noopener noreferrer\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-pro-new.png\" alt=\"Enterprise website security\" \/><\/a><\/p>\n<p>Considering the above mentioned myths, ensure to implement best website security practices to be proactive and stay ahead of malicious threats.<\/p>\n<p><a class=\"get_started_cta\" href=\"https:\/\/cwatch.comodo.com\/free-malware-removal-form.php?afid=9679\"><img decoding=\"async\" src=\"\/blog\/wp-content\/uploads\/2020\/05\/cwatch-website-security.jpg\" alt=\"cWatch Website Security Software\" \/><\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The evolution of Internet has changed the way of our day to day living \u00e2\u20ac\u201c digitising our regular personal, banking, shopping activities and what not that involves sharing sensitive information over the virtual platform. This creates an itch for the bad guys from the netherworld to steal data for monetary returns. Earlier cyber-crimes were not [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":232,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[61],"class_list":["post-1102","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-website-security","tag-website-security"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Top 5 Website Security Myths To Avoid | cWatch Comodo<\/title>\n<meta name=\"description\" content=\"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Website Security Myths To Avoid | cWatch Comodo\" \/>\n<meta property=\"og:description\" content=\"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\" \/>\n<meta property=\"og:site_name\" content=\"cWatch Blog\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-08T09:36:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-28T18:55:14+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png\" \/>\n\t<meta property=\"og:image:width\" content=\"751\" \/>\n\t<meta property=\"og:image:height\" content=\"351\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@seoindia\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\"},\"author\":{\"name\":\"Admin\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\"},\"headline\":\"Website Security Myths to avoid\",\"datePublished\":\"2024-05-08T09:36:41+00:00\",\"dateModified\":\"2024-05-28T18:55:14+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\"},\"wordCount\":1244,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png\",\"keywords\":[\"Website Security\"],\"articleSection\":[\"Website Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\",\"name\":\"Top 5 Website Security Myths To Avoid | cWatch Comodo\",\"isPartOf\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png\",\"datePublished\":\"2024-05-08T09:36:41+00:00\",\"dateModified\":\"2024-05-28T18:55:14+00:00\",\"description\":\"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!\",\"breadcrumb\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png\",\"width\":751,\"height\":351,\"caption\":\"Scan Website for Malware Attack\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cwatch.comodo.com\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Website Security Myths to avoid\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#website\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"name\":\"cWatch Blog\",\"description\":\"Just another WordPress site\",\"publisher\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#organization\",\"name\":\"cWatch Blog\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"contentUrl\":\"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png\",\"width\":106,\"height\":52,\"caption\":\"cWatch Blog\"},\"image\":{\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d\",\"name\":\"Admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g\",\"caption\":\"Admin\"},\"sameAs\":[\"https:\/\/x.com\/seoindia\"],\"url\":\"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Top 5 Website Security Myths To Avoid | cWatch Comodo","description":"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Website Security Myths To Avoid | cWatch Comodo","og_description":"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!","og_url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/","og_site_name":"cWatch Blog","article_published_time":"2024-05-08T09:36:41+00:00","article_modified_time":"2024-05-28T18:55:14+00:00","og_image":[{"width":751,"height":351,"url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png","type":"image\/png"}],"author":"Admin","twitter_card":"summary_large_image","twitter_creator":"@seoindia","twitter_misc":{"Written by":"Admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#article","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/"},"author":{"name":"Admin","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d"},"headline":"Website Security Myths to avoid","datePublished":"2024-05-08T09:36:41+00:00","dateModified":"2024-05-28T18:55:14+00:00","mainEntityOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/"},"wordCount":1244,"commentCount":0,"publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png","keywords":["Website Security"],"articleSection":["Website Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/","url":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/","name":"Top 5 Website Security Myths To Avoid | cWatch Comodo","isPartOf":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage"},"thumbnailUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png","datePublished":"2024-05-08T09:36:41+00:00","dateModified":"2024-05-28T18:55:14+00:00","description":"Top 5 security myths to leave back. Avoid security myths to ensure better website health and protection. Get cWatch Protection now!","breadcrumb":{"@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#primaryimage","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2020\/05\/28.png","width":751,"height":351,"caption":"Scan Website for Malware Attack"},{"@type":"BreadcrumbList","@id":"https:\/\/cwatch.comodo.com\/blog\/website-security\/website-security-myths-to-avoid\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cwatch.comodo.com\/blog\/"},{"@type":"ListItem","position":2,"name":"Website Security Myths to avoid"}]},{"@type":"WebSite","@id":"https:\/\/cwatch.comodo.com\/blog\/#website","url":"https:\/\/cwatch.comodo.com\/blog\/","name":"cWatch Blog","description":"Just another WordPress site","publisher":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cwatch.comodo.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cwatch.comodo.com\/blog\/#organization","name":"cWatch Blog","url":"https:\/\/cwatch.comodo.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","contentUrl":"https:\/\/cwatch.comodo.com\/blog\/wp-content\/uploads\/2021\/09\/cwatch-logo.png","width":106,"height":52,"caption":"cWatch Blog"},"image":{"@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/f5e0cc253518f05044fdaa05bc515e7d","name":"Admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cwatch.comodo.com\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ae5269b75da58a8360d71d6c265856ddf66f1e49269dc25ed6170cf96323dab5?s=96&d=mm&r=g","caption":"Admin"},"sameAs":["https:\/\/x.com\/seoindia"],"url":"https:\/\/cwatch.comodo.com\/blog\/author\/seoindia\/"}]}},"_links":{"self":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1102","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/comments?post=1102"}],"version-history":[{"count":9,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1102\/revisions"}],"predecessor-version":[{"id":21091,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/posts\/1102\/revisions\/21091"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media\/232"}],"wp:attachment":[{"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/media?parent=1102"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/categories?post=1102"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cwatch.comodo.com\/blog\/wp-json\/wp\/v2\/tags?post=1102"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}