	{"id":49,"name":"Amy Williams","url":"","description":"Amy Williams is a freelance writer and mother from Southern California. With two children of her own, she is passionate about tech safety and seeks to help parents protect children from the threats of the digital world's through her writing. Follow her on Twitter at <a href=\"https:\/\/twitter.com\/AmyKWilliams1\">@AmyKWilliams1<\/a>.","link":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/","slug":"amy-williams","avatar_urls":{"24":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=24&d=mm&r=g","48":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=48&d=mm&r=g","96":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=96&d=mm&r=g"},"meta":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v17.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"profile\" \/>\n<meta property=\"og:title\" content=\"Amy Williams, Author at The Mac Security Blog\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/\" \/>\n<meta property=\"og:site_name\" content=\"The Mac Security Blog\" \/>\n<meta property=\"og:image\" content=\"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=500&#038;d=mm&#038;r=g\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\",\"name\":\"Intego\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"sameAs\":[],\"logo\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"contentUrl\":\"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png\",\"width\":875,\"height\":875,\"caption\":\"Intego\"},\"image\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#logo\"}},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/\",\"name\":\"The Mac Security Blog\",\"description\":\"Keep Macs safe from the dangers of the Internet\",\"publisher\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"ProfilePage\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#webpage\",\"url\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/\",\"name\":\"Amy Williams, Author at The Mac Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#website\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.intego.com\/mac-security-blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Archives for Amy Williams\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dc5d6e7ec47294c3c8ac9992f631eeb6\",\"name\":\"Amy Williams\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/#personlogo\",\"inLanguage\":\"en-US\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=96&d=mm&r=g\",\"caption\":\"Amy Williams\"},\"description\":\"Amy Williams is a freelance writer and mother from Southern California. With two children of her own, she is passionate about tech safety and seeks to help parents protect children from the threats of the digital world's through her writing. Follow her on Twitter at @AmyKWilliams1.\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#webpage\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/","og_locale":"en_US","og_type":"profile","og_title":"Amy Williams, Author at The Mac Security Blog","og_url":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/","og_site_name":"The Mac Security Blog","og_image":[{"url":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=500&d=mm&r=g"}],"twitter_card":"summary_large_image","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Organization","@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization","name":"Intego","url":"https:\/\/www.intego.com\/mac-security-blog\/","sameAs":[],"logo":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo","inLanguage":"en-US","url":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","contentUrl":"https:\/\/www.intego.com\/mac-security-blog\/wp-content\/uploads\/2022\/10\/intego-organization-logo-for-google-knowledge-graph-875x875-1.png","width":875,"height":875,"caption":"Intego"},"image":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#logo"}},{"@type":"WebSite","@id":"https:\/\/www.intego.com\/mac-security-blog\/#website","url":"https:\/\/www.intego.com\/mac-security-blog\/","name":"The Mac Security Blog","description":"Keep Macs safe from the dangers of the Internet","publisher":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.intego.com\/mac-security-blog\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"ProfilePage","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#webpage","url":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/","name":"Amy Williams, Author at The Mac Security Blog","isPartOf":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/#website"},"breadcrumb":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.intego.com\/mac-security-blog\/"},{"@type":"ListItem","position":2,"name":"Archives for Amy Williams"}]},{"@type":"Person","@id":"https:\/\/www.intego.com\/mac-security-blog\/#\/schema\/person\/dc5d6e7ec47294c3c8ac9992f631eeb6","name":"Amy Williams","image":{"@type":"ImageObject","@id":"https:\/\/www.intego.com\/mac-security-blog\/#personlogo","inLanguage":"en-US","url":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a8fce1198bbcd16351de05ed4b39da3f?s=96&d=mm&r=g","caption":"Amy Williams"},"description":"Amy Williams is a freelance writer and mother from Southern California. With two children of her own, she is passionate about tech safety and seeks to help parents protect children from the threats of the digital world's through her writing. Follow her on Twitter at @AmyKWilliams1.","mainEntityOfPage":{"@id":"https:\/\/www.intego.com\/mac-security-blog\/author\/amy-williams\/#webpage"}}]}},"amp_dev_tools_enabled":false,"_links":{"self":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users\/49"}],"collection":[{"href":"https:\/\/origin.intego.com\/mac-security-blog\/wp-json\/wp\/v2\/users"}]}}