{"id":91055,"date":"2020-02-28T08:18:28","date_gmt":"2020-02-28T16:18:28","guid":{"rendered":"https:\/\/www.intego.com\/mac-security-blog\/?p=91055"},"modified":"2023-04-11T17:34:15","modified_gmt":"2023-04-12T00:34:15","slug":"10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124","status":"publish","type":"post","link":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/","title":{"rendered":"Never do THIS on your work computer or phone! &#8211; Intego Mac Podcast Episode 124"},"content":{"rendered":"<p><iframe loading=\"lazy\" src=\"https:\/\/fireside.fm\/player\/v2\/GegHgcrH+ot0IMG37?theme=dark\" width=\"740\" height=\"200\" frameborder=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>Your work computer or phone doesn&#8217;t belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your activity, and record what you do, and even, perhaps, what you type.<\/p>\n<ul>\n<li><a href=\"https:\/\/www.rsaconference.com\" target=\"_blank\" rel=\"noopener\">RSA Conference 2020<\/a><\/li>\n<li><a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone\/\">10 Things You Shouldn\u2019t Do on Your Work Computer (or Phone)<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/BadUSB\" target=\"_blank\" rel=\"noopener\">BadUSB (Wikipedia)<\/a> (discussed from 20:47 to 22:02)<\/li>\n<li><a href=\"https:\/\/mg.lol\/blog\/omg-cable\/\" target=\"_blank\" rel=\"noopener\">O.MG Cable<\/a> (discussed from 20:47 to 22:02)<\/li>\n<li><a href=\"https:\/\/podcast.intego.com\/125\" rel=\"noopener\">Next episode, #125: RSA Conference 2020 Highlights<\/a><\/li>\n<\/ul>\n<p><em>Related article:<\/em><\/p>\n<blockquote class=\"wp-embedded-content\" data-secret=\"DMVaggXKBi\"><p><a href=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone\/\">10 Things You Shouldn&#8217;t Do on Your Work Computer (or Phone)<\/a><\/p><\/blockquote>\n<p><iframe class=\"wp-embedded-content\" sandbox=\"allow-scripts\" security=\"restricted\" style=\"position: absolute; clip: rect(1px, 1px, 1px, 1px);\" title=\"&#8220;10 Things You Shouldn&#8217;t Do on Your Work Computer (or Phone)&#8221; &#8212; The Mac Security Blog\" src=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone\/embed\/#?secret=DMVaggXKBi\" data-secret=\"DMVaggXKBi\" width=\"500\" height=\"282\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\"><\/iframe><\/p>\n<p>If you like what you hear, be sure to rate and review the Intego Mac Podcast on Apple Podcasts.<\/p>\n<p><a href=\"https:\/\/podcasts.apple.com\/us\/podcast\/intego-mac-podcast\/id1293834627\"><img loading=\"lazy\" class=\"aligncenter size-thumbnail wp-image-78820\" src=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png\" alt=\"Intego Mac Podcast\" width=\"150\" height=\"39\" srcset=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-150x39.png 150w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts-300x78.png 300w, https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/05\/Listen_on_Apple_Podcasts.png 400w\" sizes=\"(max-width: 150px) 100vw, 150px\" \/><\/a><\/p>\n<p><strong>Have a question? Ask us!<\/strong><\/p>\n<p>Listeners can <a href=\"http:\/\/podcast.intego.com\/contact\" target=\"_blank\" rel=\"nofollow noopener noreferrer\">contact Intego<\/a> via email at podcast@intego.com and ask us any questions that they want to hear discussed on the podcast, or to provide feedback and ideas for upcoming podcast episodes.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Your work computer or phone doesn&#8217;t belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your activity, and record what you do, and even, perhaps, what you type. RSA Conference 2020 10 Things You Shouldn\u2019t Do on Your Work Computer (or Phone) [&hellip;]<\/p>\n","protected":false},"author":46,"featured_media":80878,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"spay_email":"","jetpack_publicize_message":"","jetpack_is_tweetstorm":false},"categories":[4390],"tags":[3715],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"description\" content=\"Your work computer or phone doesn&#039;t belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Never do THIS on your work computer or phone! - Intego Mac Podcast Episode 124 - The Mac Security Blog\" \/>\n<meta property=\"og:description\" content=\"Your work computer or phone doesn&#039;t belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-02-28T16:18:28+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-12T00:34:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\" \/>\n\t<meta property=\"og:image:width\" content=\"400\" \/>\n\t<meta property=\"og:image:height\" content=\"260\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Kirk McElhearn\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"1 minute\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"width\":400,\"height\":260,\"caption\":\"Intego Mac Podcast - Apple security news and more\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/\",\"name\":\"Never do THIS on your work computer or phone! - Intego Mac Podcast Episode 124 - The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage\"},\"datePublished\":\"2020-02-28T16:18:28+00:00\",\"dateModified\":\"2023-04-12T00:34:15+00:00\",\"description\":\"Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your\",\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Never do THIS on your work computer or phone! &#8211; Intego Mac Podcast Episode 124\"}]},{\"@type\":\"Article\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage\"},\"author\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\"},\"headline\":\"Never do THIS on your work computer or phone! &#8211; Intego Mac Podcast Episode 124\",\"datePublished\":\"2020-02-28T16:18:28+00:00\",\"dateModified\":\"2023-04-12T00:34:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage\"},\"wordCount\":150,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png\",\"keywords\":[\"Intego Mac Podcast\"],\"articleSection\":[\"Intego Mac Security Podcast\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#respond\"]}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09\",\"name\":\"Kirk McElhearn\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g\",\"caption\":\"Kirk McElhearn\"},\"description\":\"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.\",\"sameAs\":[\"http:\/\/www.kirkville.com\"],\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"description":"Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/","og_locale":"en_US","og_type":"article","og_title":"Never do THIS on your work computer or phone! - Intego Mac Podcast Episode 124 - The Mac Security Blog","og_description":"Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your","og_url":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/","og_site_name":"The Mac Security Blog","article_published_time":"2020-02-28T16:18:28+00:00","article_modified_time":"2023-04-12T00:34:15+00:00","og_image":[{"width":400,"height":260,"url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","type":"image\/png"}],"twitter_card":"summary_large_image","twitter_misc":{"Written by":"Kirk McElhearn","Est. reading time":"1 minute"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","width":400,"height":260,"caption":"Intego Mac Podcast - Apple security news and more"},{"@type":"WebPage","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/","name":"Never do THIS on your work computer or phone! - Intego Mac Podcast Episode 124 - The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage"},"datePublished":"2020-02-28T16:18:28+00:00","dateModified":"2023-04-12T00:34:15+00:00","description":"Your work computer or phone doesn't belong to you, and you should be careful about what you do on these devices. Your employer can track you and all your","breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Never do THIS on your work computer or phone! &#8211; Intego Mac Podcast Episode 124"}]},{"@type":"Article","@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#article","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage"},"author":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09"},"headline":"Never do THIS on your work computer or phone! &#8211; Intego Mac Podcast Episode 124","datePublished":"2020-02-28T16:18:28+00:00","dateModified":"2023-04-12T00:34:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#webpage"},"wordCount":150,"commentCount":0,"publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#primaryimage"},"thumbnailUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","keywords":["Intego Mac Podcast"],"articleSection":["Intego Mac Security Podcast"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.intego.com\/mac-security-blog\/10-things-you-shouldnt-do-on-your-work-computer-or-phone-intego-mac-podcast-episode-124\/#respond"]}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/a27d67016ab454807cd0c055fc28bb09","name":"Kirk McElhearn","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/9ffd73df6063179d7cdcb79109ff0a2d?s=96&d=mm&r=g","caption":"Kirk McElhearn"},"description":"Kirk McElhearn has been writing about Apple product and computer security for more than 25 years. His blog, Kirkville, links to his work. He is co-host of the Intego Mac Podcast, as well as several other podcasts, and is a regular contributor to The Mac Security Blog, TidBITS, and several other websites and publications. Kirk has written more than two dozen books, including Take Control books about Apple's media apps, Scrivener, and LaunchBar. Follow him on Bluesky at @kirkville.com.","sameAs":["http:\/\/www.kirkville.com"],"url":"https:\/\/www.intego.com\/mac-security-blog\/author\/kirk-mcelhearn\/"}]}},"jetpack_featured_media_url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2018\/07\/Intego-Mac-Podcast-New-Episode-Featured.png","jetpack_publicize_connections":[],"jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/p4VAYd-nGD","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91055"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/46"}],"replies":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/comments?post=91055"}],"version-history":[{"count":6,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91055\/revisions"}],"predecessor-version":[{"id":97686,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/posts\/91055\/revisions\/97686"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media\/80878"}],"wp:attachment":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/media?parent=91055"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/categories?post=91055"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/tags?post=91055"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}