{"id":35707,"date":"2015-01-22T09:14:10","date_gmt":"2015-01-22T17:14:10","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=35707"},"modified":"2015-01-22T09:42:47","modified_gmt":"2015-01-22T17:42:47","slug":"weak-passwords-small-business-security-threats","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/","title":{"rendered":"Are Weak Passwords Putting Your Small Business at Risk?"},"content":{"rendered":"<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/weak-passwords-smb\/\" rel=\"attachment wp-att-35854\"><img loading=\"lazy\" class=\"aligncenter wp-image-35854 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-SMB.jpg\" alt=\"Weak Passwords Small Business Security Risks\" width=\"600\" height=\"300\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-SMB.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-SMB-150x75.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-SMB-300x150.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<p>A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not just the realm of casual Internet users; they are also an issue that is worryingly common in business, especially in small companies where passwords are regularly shared between colleagues.<\/p>\n<p>According to a recent\u00a0<a title=\"Link to report\" href=\"http:\/\/www.verizonenterprise.com\/resources\/reports\/rp_data-breach-investigations-report-2012_en_xg.pdf\" target=\"_blank\">Verizon Business Data Breach Investigations Report<\/a>, 97% of data breaches are due to the use of outdated software versions, non-hardened configurations and weak passwords, while\u00a0other estimates\u00a0showed that two out of three data breaches involve poor passwords.<\/p>\n<p>Case in point: Small business\u00a0security is only as good as the passwords protecting the computers and online accounts that employees use.\u00a0Fortunately, you don&#8217;t need to set up a complicated security policy; even some simple actions can heighten your security and keep cyber-criminals from breaching your fortifications.<\/p>\n<h3>Weak Passwords are\u00a0a Big Security Threat<\/h3>\n<p>A\u00a0big security threat facing\u00a0small businesses\u00a0is\u00a0<a title=\"Why Trust a Password Manager? Because It\u2019s Better Than Having Poor Password Hygiene\" href=\"https:\/\/www.intego.com\/mac-security-blog\/why-trust-a-password-manager\/\" target=\"_blank\">poor password hygiene<\/a>\u2014a risk your business should not ignore.\u00a0The use of\u00a0<a title=\"8 Password Manager Options for Mac and iOS\" href=\"https:\/\/www.intego.com\/mac-security-blog\/8-password-manager-options-for-mac-and-ios\/\" target=\"_blank\">password managers<\/a>\u00a0can make this easier to deal with, allowing employees to use random passwords, without the need to remember them.<\/p>\n<p>Mac users can also\u00a0<a title=\"OS X Yosemite: Security and Privacy Features Overview\" href=\"https:\/\/www.intego.com\/mac-security-blog\/os-x-yosemite-security-and-privacy-features-overview\/\" target=\"_blank\">turn on FileVault<\/a>, which encrypts all the files on a MacBook Pro or MacBook Air, and the password used for this needs to be able to withstand attacks. If an employee\u2019s laptop is lost or stolen, it may contain valuable files and information, and unbreakable password protection\u00a0can help ensure\u00a0that no one can access that data.<\/p>\n<p>In addition, many businesses leave the default user name and password on their routers, network attached storage devices, and other hardware, because it\u2019s easier to deal with. But any hacker knows that the default user name and password on most routers is \u201cadmin\u201d and &#8220;1234&#8221;; if yours is different, don\u2019t worry, anyone can Google the model and find the defaults. Using a default password is\u00a0a perfect example of poor password hygiene, and quite honestly, if you&#8217;re guilty of doing this, it is a terrible\u00a0habit you\u00a0should change (as well as your passwords)\u00a0immediately.<\/p>\n<p>Small business owners need to be vigilant of security threats made possible\u00a0by weak passwords; develop a solid password policy for\u00a0your employees, and enforce it, requiring everyone\u00a0to change their passwords regularly. If you must, put this on a sticky note so you don&#8217;t forget: Passwords are the keys to your computers and your valuable data.<\/p>\n<h3>Don&#8217;t be the Easiest Target<\/h3>\n<p>If you run a small business, you may be an especially easy target for hackers and cyber-criminals. The pickings may be slimmer than with a multinational corporation, but bigger companies are better protected. Your company may not have the resources to maintain a dedicated IT team, and no one person may be responsible for securing your network, implementing password policies, ensuring data protection, and, above all, analyzing attacks when they occur to unsure they don&#8217;t happen again.<\/p>\n<p>Do what you can even if resources are limited, as you&#8217;re simply aiming to make your valuable data harder to get at than average.\u00a0Think of it like the analogy of not having to outrun a bear to avoid getting eaten: you don&#8217;t have to be fastest, you just have to run faster than the slowest guy. Don&#8217;t be the easiest target, and you&#8217;ve made great progress.<\/p>\n<p>If you manage the security of your company, we encourage you to download our SMB security white paper,\u00a0where we look at the main cyber-security threats small businesses face, and give you some tips for shoring up your defenses.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/security-threats-small-business\"><img loading=\"lazy\" class=\"aligncenter wp-image-35719 size-full\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/four-big-security-threats-facing-small-business.png\" alt=\"Security threats small business\" width=\"292\" height=\"381\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/four-big-security-threats-facing-small-business.png 292w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/four-big-security-threats-facing-small-business-114x150.png 114w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/four-big-security-threats-facing-small-business-229x300.png 229w\" sizes=\"(max-width: 292px) 100vw, 292px\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><a title=\"Four Big Security Threats Facing Small Business \" href=\"https:\/\/www.intego.com\/security-threats-small-business\" target=\"_blank\"><span style=\"color: #ff6600;\">Download our white paper today!<\/span><\/a><\/p>\n<p>Cyber-security is essential for businesses of all sizes, whether you\u2019re a Fortune 500 company or a small business. With more business activities taking place on computers, over networks and in the cloud, businesses can no longer ignore the threats they face.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not just the realm of casual Internet users; they are also an issue that is worryingly common in business, especially in small companies where passwords are regularly shared [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":35860,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[151,13],"tags":[353,1852,1372,1375,1849],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Are Weak Passwords Putting Your Small Business at Risk? - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-01-22T17:14:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2015-01-22T17:42:47+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg\",\"width\":400,\"height\":260,\"caption\":\"Weak Passwords Small Business\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\",\"name\":\"Are Weak Passwords Putting Your Small Business at Risk? - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage\"},\"datePublished\":\"2015-01-22T17:14:10+00:00\",\"dateModified\":\"2015-01-22T17:42:47+00:00\",\"description\":\"A weak password is like a cheap lock; it\\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Are Weak Passwords Putting Your Small Business at Risk?\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Are Weak Passwords Putting Your Small Business at Risk?\",\"datePublished\":\"2015-01-22T17:14:10+00:00\",\"dateModified\":\"2015-01-22T17:42:47+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage\"},\"wordCount\":654,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg\",\"keywords\":[\"Password Security\",\"Security Threats\",\"Small Business\",\"SMB\",\"Weak Passwords\"],\"articleSection\":[\"Recommended\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/","og_locale":"en_US","og_type":"article","og_title":"Are Weak Passwords Putting Your Small Business at Risk? - The Mac Security Blog","og_description":"A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not","og_url":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-01-22T17:14:10+00:00","article_modified_time":"2015-01-22T17:42:47+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg","width":400,"height":260,"caption":"Weak Passwords Small Business"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/","name":"Are Weak Passwords Putting Your Small Business at Risk? - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage"},"datePublished":"2015-01-22T17:14:10+00:00","dateModified":"2015-01-22T17:42:47+00:00","description":"A weak password is like a cheap lock; it\u2019s easy to break, and once the door is open, cyber-criminals can take just about anything. Weak passwords are not","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Are Weak Passwords Putting Your Small Business at Risk?"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Are Weak Passwords Putting Your Small Business at Risk?","datePublished":"2015-01-22T17:14:10+00:00","dateModified":"2015-01-22T17:42:47+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#webpage"},"wordCount":654,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg","keywords":["Password Security","Security Threats","Small Business","SMB","Weak Passwords"],"articleSection":["Recommended","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/weak-passwords-small-business-security-threats\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/01\/Weak-Passwords-Small-Business.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-9hV","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35707"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=35707"}],"version-history":[{"count":23,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35707\/revisions"}],"predecessor-version":[{"id":35923,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/35707\/revisions\/35923"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/35860"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=35707"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=35707"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=35707"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}