{"id":35698,"date":"2016-10-12T09:58:37","date_gmt":"2016-10-12T16:58:37","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=35698"},"modified":"2024-05-20T12:18:03","modified_gmt":"2024-05-20T19:18:03","slug":"data-loss-a-security-threat-your-small-business-must-not-ignore","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/","title":{"rendered":"Data Loss: A Security Threat Your Small Business Must Not Ignore"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter wp-image-58249 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/small-business-data-security-threats.jpg\" alt=\"Data Loss: A Security Threat Your Small Business Must Not Ignore\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/small-business-data-security-threats.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/small-business-data-security-threats-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/small-business-data-security-threats-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>Observed every October, National Cyber Security Awareness Month (NCSAM) is well under way, marking the 13th annual event. NCSAM 2016 focuses on a different cyber-security issue each week and will highlight the\u00a0roles both individuals and organizations must play in promoting a safer Internet.<\/p>\n<p>This week&#8217;s concept of the NCSAM 2016 campaign is a continuation of last year&#8217;s theme, which focuses on <a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/\" target=\"_blank\" rel=\"noopener\">creating a culture of cybersecurity in the workplace<\/a>. In this article,\u00a0we&#8217;ll dive into the issue of data loss: a security threat your small business must not ignore.<\/p>\n<h3>Data Loss is a Major Threat<\/h3>\n<p>One of the absolute best things you can do for your business Macs is to make a backup.\u00a0Your business\u00a0assets may include building and equipment, but what sets your company\u00a0apart from others is your personnel and your data. This data includes intellectual property, marketing plans, sales data, customer lists, product specs and more. It also includes your financial records, emails, letters and faxes, and every other bit of data that lets your business operate smoothly \u2014 all of which is, in many cases, no longer saved on paper.<\/p>\n<p>In a study by <a href=\"https:\/\/www.helpnetsecurity.com\/2013\/06\/19\/failed-backups-endanger-revenue-and-productivity\/\" target=\"_blank\" rel=\"noopener\">Help Net Security<\/a>, more than half (53%) of the organizations surveyed revealed they\u00a0do not conduct daily backups, while research by\u00a0<a title=\"Link to PCI Council research\" href=\"https:\/\/www.pcisecuritystandards.org\/pdfs\/14_05_14_Whats_your_password_SMB_webinar_final.pdf\" target=\"_blank\" rel=\"noopener\">the\u00a0PCI Council<\/a>\u00a0showed that 60% of small businesses that experience a major data loss go out of business within six months.<\/p>\n<p>Ask yourself: What would happen to your company if, tomorrow, you lost all the computers in your offices? Would you still be able to function? Do you have backups of your data; and not just in your offices, but also in a secure, off-site location or in the cloud? How long would it take for you to get up and running again?<\/p>\n<p>Data loss occurs for many reasons. A hard drive may crash, a computer may kick the bucket, or a power surge could cause damage to your hardware. Perhaps malware used by cybercriminals to glean valuable data sneaks past your defenses; or worse, your business may get snared by ransomware that encrypts or\u00a0corrupts your data. There are also natural disasters: You never know when an earthquake, flood or tornado will hit.<\/p>\n<h3>Building a Robust Data Security Policy<\/h3>\n<p>You may have a plan for securing personnel in the case of an emergency, but have you planned how to protect your data if the unexpected happens?<\/p>\n<p>Every business needs to back up its data. Small businesses may not have a formal backup policy; some employees may back up their data regularly and others may not. If you lose essential data, it can cost time, money and productivity to recovery it; you may not be able to recover all of it.<\/p>\n<p>A robust data security policy doesn&#8217;t have to be complicated. You need to make sure that every computer, and every network drive, is backed up regularly, and redundantly, but your don&#8217;t need to spend a lot of money doing this; most of the process can be automated. You can installed software on your computers that backs up your data to network drives, network attached storage (NAS) devices, and even to cloud backup services. But you should always ensure two things:<\/p>\n<ol>\n<li><strong>Your backups must be redundant.<\/strong> Don&#8217;t trust just one hard drive or device to store your data. Make local backups and off-site backups, either to the cloud, or using hard drives that you physically move to a secure location regularly. These could be drives you move among your various offices, or that you put in a safe deposit box once a week, switching the previous week&#8217;s drives.<\/li>\n<li><strong>Your backups are reliable.<\/strong> You need to check your backup drives regularly for disk errors. Hard disks fail; it&#8217;s not a matter of if they will, but when. You should regularly check your backup drives and devices to ensure that you can recover the data they contain. There&#8217;s nothing worse than losing data on a computer only to find that a backup is corrupted.<\/li>\n<\/ol>\n<h3>Hope for the Best, Plan for the Worst<\/h3>\n<p>In the past,\u00a0we&#8217;ve also covered things\u00a0like <a href=\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\" target=\"_blank\" rel=\"noopener\">weak passwords<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/phishing-dangers-in-business-and-how-to-avoid-getting-hooked\/\" target=\"_blank\" rel=\"noopener\">phishing dangers<\/a>, and have reported on\u00a0IT\u00a0confidence in <a href=\"https:\/\/www.intego.com\/mac-security-blog\/business-mac-security-threats\/\" target=\"_blank\" rel=\"noopener\">the\u00a0security of Macs\u00a0in the workplace<\/a>, because with more and more business activities taking place on Mac computers, over networks and in the cloud, businesses of all sizes can no longer ignore the threats we\u00a0face \u2014 up to and including protection from data loss.<\/p>\n<p>The bottom line is that just because your business is small doesn&#8217;t mean you can ignore data security. As we like to say, hope for the best and plan for the worst.<\/p>\n<p>Now is a better time than ever to ensure company data security policies and tools are protecting your business Macs to the same extent that Windows machines are protected. If steps are not taken to prevent data loss, small business owners could find themselves struggling with the fallout.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens? <\/p>\n","protected":false},"author":4,"featured_media":58261,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[32,3142,711,2494,3139,1852,1372,1375],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Data Loss: A Security Threat Your Small Business Must Not Ignore - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-12T16:58:37+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-20T19:18:03+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg\",\"width\":400,\"height\":260,\"caption\":\"Data Security Threats Small Business\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/\",\"name\":\"Data Loss: A Security Threat Your Small Business Must Not Ignore - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage\"},\"datePublished\":\"2016-10-12T16:58:37+00:00\",\"dateModified\":\"2024-05-20T19:18:03+00:00\",\"description\":\"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Loss: A Security Threat Your Small Business Must Not Ignore\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Data Loss: A Security Threat Your Small Business Must Not Ignore\",\"datePublished\":\"2016-10-12T16:58:37+00:00\",\"dateModified\":\"2024-05-20T19:18:03+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage\"},\"wordCount\":823,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg\",\"keywords\":[\"Backups\",\"Data Loss\",\"National Cyber Security Awareness Month (NCSAM)\",\"National Cybersecurity Awareness Month (NCSAM)\",\"NCSAM 2016\",\"Security Threats\",\"Small Business\",\"SMB\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/","og_locale":"en_US","og_type":"article","og_title":"Data Loss: A Security Threat Your Small Business Must Not Ignore - The Mac Security Blog","og_description":"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?","og_url":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/","og_site_name":"The Mac Security Blog","article_published_time":"2016-10-12T16:58:37+00:00","article_modified_time":"2024-05-20T19:18:03+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg","width":400,"height":260,"caption":"Data Security Threats Small Business"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/","name":"Data Loss: A Security Threat Your Small Business Must Not Ignore - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage"},"datePublished":"2016-10-12T16:58:37+00:00","dateModified":"2024-05-20T19:18:03+00:00","description":"Data loss occurs for many reasons. Have you planned how to protect your data if the unexpected happens?","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Data Loss: A Security Threat Your Small Business Must Not Ignore"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Data Loss: A Security Threat Your Small Business Must Not Ignore","datePublished":"2016-10-12T16:58:37+00:00","dateModified":"2024-05-20T19:18:03+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#webpage"},"wordCount":823,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg","keywords":["Backups","Data Loss","National Cyber Security Awareness Month (NCSAM)","National Cybersecurity Awareness Month (NCSAM)","NCSAM 2016","Security Threats","Small Business","SMB"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/data-loss-a-security-threat-your-small-business-must-not-ignore\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2016\/10\/data-security-threats-small-business.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9hM","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35698"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=35698"}],"version-history":[{"count":38,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35698\/revisions"}],"predecessor-version":[{"id":100683,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35698\/revisions\/100683"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/58261"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=35698"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=35698"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=35698"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}