{"id":119,"name":"Marlene Baiton","url":"","description":"Marlene has more than a decade of writing and editing experience and has spent the last few years focused on cybersecurity research and product testing. She\u2019s known for digging into the why behind things and turning that detail into content that\u2019s clear, accurate, and useful. When she\u2019s not working, she\u2019s with her family, usually with a dog (or four) close by.","link":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/","slug":"marlene-baiton","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=96&d=mm&r=g"},"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"profile\" \/>\n<meta property=\"og:title\" content=\"Content Manager\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=500&#038;d=mm&#038;r=g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ProfilePage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/\",\"name\":\"Content Manager\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for Marlene Baiton\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/2eca894892dc5385cffbd9073f02eb7b\",\"name\":\"Marlene Baiton\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=96&d=mm&r=g\",\"caption\":\"Marlene Baiton\"},\"description\":\"Marlene has more than a decade of writing and editing experience and has spent the last few years focused on cybersecurity research and product testing. She\\u2019s known for digging into the why behind things and turning that detail into content that\\u2019s clear, accurate, and useful. When she\\u2019s not working, she\\u2019s with her family, usually with a dog (or four) close by.\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#webpage\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/","og_locale":"en_US","og_type":"profile","og_title":"Content Manager","og_url":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/","og_site_name":"The Mac Security Blog","og_image":[{"url":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=500&d=mm&r=g"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ProfilePage","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/","name":"Content Manager","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Archives for Marlene Baiton"}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/2eca894892dc5385cffbd9073f02eb7b","name":"Marlene Baiton","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1217a06276001cc76831889aa78c12ab?s=96&d=mm&r=g","caption":"Marlene Baiton"},"description":"Marlene has more than a decade of writing and editing experience and has spent the last few years focused on cybersecurity research and product testing. She\u2019s known for digging into the why behind things and turning that detail into content that\u2019s clear, accurate, and useful. When she\u2019s not working, she\u2019s with her family, usually with a dog (or four) close by.","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/marlene-baiton\/#webpage"}}]}},"amp_dev_tools_enabled":false,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/119"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users"}]}}