{"id":46840,"date":"2015-10-08T13:44:59","date_gmt":"2015-10-08T20:44:59","guid":{"rendered":"http:\/\/www.intego.com\/mac-security-blog\/?p=46840"},"modified":"2017-01-06T15:50:37","modified_gmt":"2017-01-06T23:50:37","slug":"how-to-create-a-culture-of-cybersecurity-at-work-infographic","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/","title":{"rendered":"How to Create a Culture of Cybersecurity at Work [Infographic]"},"content":{"rendered":"<p>All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for every business. That&#8217;s why week 2 of October&#8217;s\u00a0<a href=\"https:\/\/www.intego.com\/mac-security-blog\/2015-national-cyber-security-awareness-month-what-to-expect\/\" target=\"_blank\">National Cyber Security Awareness Month<\/a>\u00a0(NCSAM) focuses on providing resources that help businesses establish a culture of\u00a0cybersecurity.<\/p>\n<p>If you run a small business, you may be an especially easy target for hackers and cyber-criminals. The pickings may be slimmer than with a multinational corporation, but bigger companies are better protected. Your company may not have the resources to maintain a dedicated IT team, and no one person may be responsible for securing your network, implementing password policies, ensuring data protection, and, above all, analyzing attacks when they occur to ensure\u00a0they don&#8217;t happen again.<\/p>\n<p>In the below infographic, we offer some ways that business leaders can protect their organizations, their employees and consumers&#8217; data. Take a look and discover how your business can prepare for \u2014 and respond to \u2014\u00a0cybersecurity\u00a0incidents.<\/p>\n<p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/cybersecurity-at-work\/\" rel=\"attachment wp-att-46864\"><img loading=\"lazy\" class=\"aligncenter wp-image-46864\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Cybersecurity-At-Work.png\" alt=\"Creating a Culture of Cybersecurity at Work - Infographic\" width=\"600\" height=\"2165\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Cybersecurity-At-Work.png 1600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Cybersecurity-At-Work-83x300.png 83w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Cybersecurity-At-Work-284x1024.png 284w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/Cybersecurity-At-Work-657x2370.png 657w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/a><\/p>\n<div>\n<hr>\n<div>\n<h3>Want To Improve Your Small Business Security?<\/h3>\n<p>Intego Flextivity is the industry&#8217;s first integrated\u00a0cloud-based security\u00a0and employee monitoring\u00a0solution designed with Mac-based small businesses\u00a0in mind.<\/p>\n<p>Give Flextivity a try, and\u00a0<a href=\"https:\/\/www.flextivity.com\/app\/home.html#\/home\/pricing\" target=\"_blank\">choose from one of three options<\/a>\u00a0based on your employee monitoring and Mac security needs:<\/p>\n<ul>\n<li><strong><a title=\"Flextivity Secure \" href=\"https:\/\/www.intego.com\/business\/flextivity-secure\" target=\"_blank\">Flextivity Secure<\/a><\/strong>: Antivirus and firewall protection (starting at $3.50 per computer<\/li>\n<li><strong><a title=\"Flextivity Monitor\" href=\"https:\/\/www.intego.com\/business\/flextivity-monitor\" target=\"_blank\">Flextivity Monitor<\/a><\/strong>: Detailed activity reporting, app and network usage controls, enabling employers and employees to bring greater transparency to their daily work stream ($8.50 per computer)<\/li>\n<li><a title=\"Flextivity - All-In-One Security &amp; Monitoring for SMB\" href=\"https:\/\/www.intego.com\/business\/flextivity-complete\" target=\"_blank\"><strong>Flextivity Complete<\/strong><\/a>: Fully integrated suite with both Secure and Monitor ($12 per computer)<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for every business. That&#8217;s why week 2 of October&#8217;s\u00a0National Cyber Security Awareness Month\u00a0(NCSAM) focuses on providing resources that help businesses establish a culture of\u00a0cybersecurity. If you run a small business, you may be an especially easy target [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":46876,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[10,13],"tags":[709,159,711,2494,2497,1372],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How to Create a Culture of Cybersecurity at Work [Infographic] - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2015-10-08T20:44:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-06T23:50:37+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png\",\"width\":400,\"height\":260,\"caption\":\"Cybersecurity at Work - NCSAM 2015\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/\",\"name\":\"How to Create a Culture of Cybersecurity at Work [Infographic] - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage\"},\"datePublished\":\"2015-10-08T20:44:59+00:00\",\"dateModified\":\"2017-01-06T23:50:37+00:00\",\"description\":\"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"How to Create a Culture of Cybersecurity at Work [Infographic]\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"How to Create a Culture of Cybersecurity at Work [Infographic]\",\"datePublished\":\"2015-10-08T20:44:59+00:00\",\"dateModified\":\"2017-01-06T23:50:37+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage\"},\"wordCount\":261,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png\",\"keywords\":[\"Cybersecurity\",\"Infographic\",\"National Cyber Security Awareness Month (NCSAM)\",\"National Cybersecurity Awareness Month (NCSAM)\",\"NCSAM 2015\",\"Small Business\"],\"articleSection\":[\"How To\",\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/","og_locale":"en_US","og_type":"article","og_title":"How to Create a Culture of Cybersecurity at Work [Infographic] - The Mac Security Blog","og_description":"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for","og_url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/","og_site_name":"The Mac Security Blog","article_published_time":"2015-10-08T20:44:59+00:00","article_modified_time":"2017-01-06T23:50:37+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png","width":400,"height":260,"caption":"Cybersecurity at Work - NCSAM 2015"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/","name":"How to Create a Culture of Cybersecurity at Work [Infographic] - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage"},"datePublished":"2015-10-08T20:44:59+00:00","dateModified":"2017-01-06T23:50:37+00:00","description":"All businesses face cybersecurity challenges, which means proactively protecting organizational assets, employees and consumers must be a priority for","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"How to Create a Culture of Cybersecurity at Work [Infographic]"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"How to Create a Culture of Cybersecurity at Work [Infographic]","datePublished":"2015-10-08T20:44:59+00:00","dateModified":"2017-01-06T23:50:37+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#webpage"},"wordCount":261,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png","keywords":["Cybersecurity","Infographic","National Cyber Security Awareness Month (NCSAM)","National Cybersecurity Awareness Month (NCSAM)","NCSAM 2015","Small Business"],"articleSection":["How To","Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/how-to-create-a-culture-of-cybersecurity-at-work-infographic\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2015\/10\/cybersecurity-ncsam2015.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-cbu","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46840"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=46840"}],"version-history":[{"count":20,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46840\/revisions"}],"predecessor-version":[{"id":61021,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/46840\/revisions\/61021"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/46876"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=46840"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=46840"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=46840"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}