{"id":58354,"date":"2017-01-28T05:30:39","date_gmt":"2017-01-28T13:30:39","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=58354"},"modified":"2017-01-25T21:10:32","modified_gmt":"2017-01-26T05:10:32","slug":"securing-small-business-data-in-mac-centric-industries","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/","title":{"rendered":"Securing Small Business Data in Mac Centric Industries"},"content":{"rendered":"<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-62011\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/business-data-security.jpg\" alt=\"Securing Small Business Data\" width=\"600\" height=\"375\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/business-data-security.jpg 600w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/business-data-security-150x94.jpg 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/business-data-security-300x188.jpg 300w\" sizes=\"(max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security is exacerbated when the businesses are Mac-based; even today, many people still believe Macs are immune to attacks. This is a concerning opinion, especially for small businesses that have a number of high profile clients. What are the big threats facing small businesses, and what can be done to secure their valuable data?<\/p>\n<h3>Mac Malware Was Only a Matter of Time<\/h3>\n<p>Over the last few years, a new trend has emerged: Mac malware is on the rise, and it has affected hundreds of thousands of Mac OS X computers. <a href=\"https:\/\/www.intego.com\/mac-security-blog\/infographic-mac-flashback-malware\/\">Flashback<\/a> and <a href=\"https:\/\/www.intego.com\/mac-security-blog\/iworm-botnet-uses-reddit-as-command-and-control-center\/\">iWorm<\/a> are two examples that garnered a lot of attention, and additional threats are aplenty.<\/p>\n<p>An increase in breaches means attackers are either more abundant, or more successful than they have been in the past; it\u2019s probably a combination of the two. And the more a platform or operating system has been successfully attacked, the more attackers are encouraged to pummel away at it.<\/p>\n<p>The level of complexity of Mac malware and its capabilities are already on par with threats built for Windows. This has produced a constantly evolving threat landscape that can be complicated and surprising to the average small business owner. As a result, business security can seem overwhelming, and in particular, for those that have a Mac user-base.<\/p>\n<p>Just because employees choose to use Mac OS X does not mean they are inherently protected from harm. In fact, Mac-based businesses are often equally enticing to cybercriminals\u2014and there are many reasons for this.<\/p>\n<h3>Size Doesn\u2019t Matter\u2014Data Does<\/h3>\n<p>One reason is because Macs are generally favored by creative industries like design, web services, marketing, public relations and advertising. These industries rely on the Mac\u2019s design credentials to support clients, and because of their close relationships with clients it means they have access to a wealth of corporate knowledge, intelligence and intellectual property (IP). This data can be an incredibly attractive and valuable target for cybercriminals.<\/p>\n<p>It is important for businesses of every size to choose effective digital security measures: comprehensive Internet usage policies, cloud-based security solutions and general employee education. The time when malware was the only threat has long passed. For cybercriminals today, size is irrelevant\u2014it is the valuable data they are after.<\/p>\n<p>For these reasons, it is critical small business owners assess the security risks within their businesses by considering the possible return on investment for intruders.<\/p>\n<h3>Are Business Macs Worth a Hack?<\/h3>\n<p>Most businesses, small and large, have lived and breathed Windows computers, and due to the enduring history of Windows attacks, they likely have products and policies in place to protect these machines. But can the same be said for the Mac OS platforms in the business environment?<\/p>\n<p>When it comes to Windows machines, businesses might have a good idea what this cost could be, and so they protect these computers accordingly. But when it comes to Macs and other Apple devices, many organizations fail to protect their Macs with as many layers of security as they would a Windows machine, or they fail to patch or update software in a timely manner.<\/p>\n<p>When these security \u201cbloopers,\u201d so to speak, occur, Macs become a low-cost point of entry for intruders wanting to breach an organization. This is problematic, because criminals know exactly how much stolen data will sell for and they know how to best spend their time to generate a maximum return on investment.<\/p>\n<p>In the eyes of a cybercriminal a computer is just a holding-place for data to be stolen, and the data on a Mac is no less valuable. Most popular software, such as Java and Adobe Flash, now work on all major operating systems, and an exploit that works on one operating system may work across them all.<\/p>\n<h3>Designing a Strong Security Strategy<\/h3>\n<p><a href=\"http:\/\/www.propertycasualty360.com\/2015\/05\/27\/small-mid-sized-businesses-hit-by-62-of-all-cyber\" target=\"_blank\">According to Timothy Francis<\/a>, a leader in the cyber insurance field, 62-percent of cyber-breach victims are small and medium-sized businesses. The lucrative value of a client\u2019s data puts creative companies firmly in the spotlight. Furthermore, creative companies have a corporate structure built around agile teams, shared resources and, commonly, a single person handling the company\u2019s security strategy\u2014often the business owner.<\/p>\n<p>This means a design agency could suddenly find itself as the weakest link in the security chain. This is concerning for clients and in particular, large corporates that value their innovation and privacy.<\/p>\n<p>If robust security systems are not in place, criminals could leverage the situation in many ways:<\/p>\n<ul>\n<li>Prolonged data theft or one-off breaches<\/li>\n<li>Unnoticeable financial transactions through a company corporate account<\/li>\n<li>IP theft, or even corporate espionage on behalf of third parties<\/li>\n<li>R&amp;D theft, sabotage or the stealing of creative materials for monetary gain<\/li>\n<li>Leaking information to the press or selling it to underground communities<\/li>\n<\/ul>\n<p>For the agency, experiencing any of the above could bring the business to its knees, both from a reputation point of view and financially. Any theft would likely lead to the client cancelling its contract, which could filter through to others doing the same. There might even be legal ramifications, as employees could be found culpable through oversight or breach of confidentiality agreements.<\/p>\n<p>Perhaps the most damaging part of a breach is that it could go unnoticed, unless a company is using a trusted cloud-based security solution to protect employee machines and to monitor the network before a breach occurs.<\/p>\n<p>Mac malware is coming at a faster pace each year as Apple\u2019s products grow in popularity. While it may never reach the torrential force of new malware released for Windows, it does not mean it is not a real threat. If a business\u2019s network or the data on it is deemed to be worth the effort, cybercriminals already have the tools at their disposal to attack.<\/p>\n<p>This risk alone demonstrates that all businesses should adopt a proactive security strategy, particularly if their business model is based on a consultative model. Now is a better time than ever to ensure company <a href=\"https:\/\/www.intego.com\/mac-security-blog\/intego-updates-flextivity-improves-security-and-productivity-for-smbs\/\">security policies and tools<\/a> are protecting Macs and Apple devices to the same extent that Windows machines are protected. If steps are not taken to prevent business data theft, small business owners could find themselves struggling with the fallout.<\/p>\n<div>\n<hr \/>\n<div>\n<p><strong>Own a Mac-based small business?<\/strong><a title=\"Productivity Tools for Mac - Intego Flextivity\" href=\"https:\/\/www.flextivity.com\/app\/home.html#\/home\/features\" target=\"_blank\">\u00a0Secure your small business data today with Flextivity&#8217;s data privacy and security\u00a0tools to protect your Macs from malware, and keep unwanted visitors from accessing the network via the firewall.<\/a><\/p>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security is exacerbated when the businesses are Mac-based; even today, many people still believe Macs are immune to attacks. This is a concerning opinion, especially for small businesses that [&hellip;]<\/p>\n","protected":false},"author":4,"featured_media":62014,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[13],"tags":[3253],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Securing Small Business Data in Mac Centric Industries - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2017-01-28T13:30:39+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2017-01-26T05:10:32+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Derek Erwin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg\",\"width\":400,\"height\":260,\"caption\":\"Small Business Data Security\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/\",\"name\":\"Securing Small Business Data in Mac Centric Industries - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage\"},\"datePublished\":\"2017-01-28T13:30:39+00:00\",\"dateModified\":\"2017-01-26T05:10:32+00:00\",\"description\":\"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Securing Small Business Data in Mac Centric Industries\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\"},\"headline\":\"Securing Small Business Data in Mac Centric Industries\",\"datePublished\":\"2017-01-28T13:30:39+00:00\",\"dateModified\":\"2017-01-26T05:10:32+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage\"},\"wordCount\":1102,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg\",\"keywords\":[\"Data Privacy Day\"],\"articleSection\":[\"Security &amp; Privacy\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812\",\"name\":\"Derek Erwin\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g\",\"caption\":\"Derek Erwin\"},\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/","og_locale":"en_US","og_type":"article","og_title":"Securing Small Business Data in Mac Centric Industries - The Mac Security Blog","og_description":"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security","og_url":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/","og_site_name":"The Mac Security Blog","article_published_time":"2017-01-28T13:30:39+00:00","article_modified_time":"2017-01-26T05:10:32+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Derek Erwin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg","width":400,"height":260,"caption":"Small Business Data Security"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/","name":"Securing Small Business Data in Mac Centric Industries - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage"},"datePublished":"2017-01-28T13:30:39+00:00","dateModified":"2017-01-26T05:10:32+00:00","description":"A common misstep by many small businesses is the presumption that because of their size, they are less of a security target. This false sense of security","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Securing Small Business Data in Mac Centric Industries"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812"},"headline":"Securing Small Business Data in Mac Centric Industries","datePublished":"2017-01-28T13:30:39+00:00","dateModified":"2017-01-26T05:10:32+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#webpage"},"wordCount":1102,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg","keywords":["Data Privacy Day"],"articleSection":["Security &amp; Privacy"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/securing-small-business-data-in-mac-centric-industries\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/d7586ee278e291223dbae05ec1d95812","name":"Derek Erwin","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/f88b4bb259f7d5b1d10884ffa4b3c126?s=96&d=mm&r=g","caption":"Derek Erwin"},"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/derek-erwin\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2017\/01\/smb-data-security.jpg","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-fbc","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58354"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=58354"}],"version-history":[{"count":11,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58354\/revisions"}],"predecessor-version":[{"id":62026,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/58354\/revisions\/62026"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/62014"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=58354"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=58354"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=58354"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}