{"id":5864,"date":"2020-07-28T11:57:51","date_gmt":"2020-07-28T10:57:51","guid":{"rendered":"https:\/\/cybersmart.com\/?p=5864"},"modified":"2021-10-03T08:45:40","modified_gmt":"2021-10-03T08:45:40","slug":"encryption-explained-how-does-it-work-and-why-do-smes-need-it","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/","title":{"rendered":"Encryption explained: how does it work and why do SMEs need it?"},"content":{"rendered":"

Most of us have heard of encryption. It\u2019s that recipe for secrecy that techy types talk about all the time. But for many of us, that\u2019s where the knowledge ends.<\/p>\n

However, for small businesses looking to improve cybersecurity<\/a>, encryption can be a vital weapon in your arsenal- and one that isn\u2019t so hard to understand. Here\u2019s a simple explanation of what encryption is, why you need it, and when to use it.<\/p>\n

What is encryption?<\/strong><\/h3>\n

Although encryption, much like \u2018the blockchain\u2019, can seem like another one of those unfathomable technical terms, it\u2019s actually pretty simple.<\/p>\n

Encryption is most commonly used to protect data in transit and at rest. Ever sent a Facebook Messenger or WhatsApp message? That uses encryption. Or, a payment using online banking? Also encryption. How about buying something from a web store? You guessed it, encryption again.<\/p>\n

You get the picture. Encryption is used everywhere in our daily lives, but how does it work?<\/p>\n

In non-technical terms, encryption is a way of randomising data so that only an authorised recipient can understand the information. Encryption converts plaintext \u2013 for example, the text in an email between you and a colleague \u2013 and converts it into ciphertext, a string of random numbers and letters. To unlock the real message or data, you need an encryption key, which is a set of mathematical values that only the sender and the recipient of the message know, like so:<\/p>\n

 <\/p>\n

\"encryption\"Photo\u00a0PixelPrivacy<\/a><\/p>\n

The principle is much the same as a password, but better (as we\u2019ll see).<\/p>\n

Why does your business need it?<\/strong><\/h3>\n

So we\u2019ve covered, in very simple terms, what encryption is. The next question is why should SMEs be using it? It\u2019s easy to assume that if you\u2019re not a huge multinational, processing reams of sensitive information, that your standard security tools such as firewalls and secure passwords are enough to protect your data. However, there are three key reasons why this isn\u2019t the case.<\/p>\n

Cyber attacks are on the rise<\/h4>\n

It\u2019s likely not news to you that cybersecurity threats to SMEs are on the rise. Barely a week goes by without another news story or set of figures released to that effect. Indeed, the Federation of Small Businesses estimates that SMEs are collectively subject to almost 10,000 cyber-attacks a day<\/a>.<\/p>\n

A recent report from cybersecurity experts, Malwarebytes, reveals that detections of new malware continue to increase by 1% year-on-year.<\/p><\/blockquote>\n

A big part of the problem is the ever-increasing volume and variety of malware out there. A recent report from cybersecurity experts, Malwarebytes<\/a>, reveals that detections of new malware continue to increase by 1% year-on-year. This might not sound like much, but when we\u2019re talking about detections in the tens of millions, it soon adds up.<\/p>\n

In this environment, it\u2019s getting harder and harder to stay ahead of the threat. However, adopting encryption can act as a strong second line of defence. For instance, someone in your organisation accidentally clicks on a malware link in an email (something we\u2019ve all done at least once), potentially exposing your data to an attacker. Using encryption means that they won\u2019t be able to read whatever they find without a key, meaning your data is safe.<\/p>\n

You\u2019re using a cloud service<\/strong><\/h4>\n

Cloud computing is now a vital part of the daily operations of most SMEs. And if you\u2019re doing business entirely in the cloud, and don\u2019t store any sensitive data on employees\u2019 devices, you\u2019re safe, right? After all, the likes of Amazon, Google, and Microsoft spend billions of dollars a year on the security of their cloud services.<\/p>\n

Unfortunately, this is only partly true. Obviously storing your data in a cloud is far better than having everything on vulnerable systems, but that doesn\u2019t mean it\u2019s entirely safe.<\/p>\n

To give an example, let\u2019s say you use a cloud-based platform like Office 365 for your everyday operations. A would-be hacker can still intercept your data as it moves between your device and the cloud. As we\u2019ve already mentioned, this is unlikely if you\u2019re working with a reputable cloud provider, but it\u2019s not impossible or even that uncommon. Using strong encryption can help protect you against this by adding another layer of defence.<\/p>\n

Passwords aren\u2019t the be-all and end-all<\/strong><\/h4>\n

Now, you may be thinking \u2018but my business has a clear password protection policy<\/a> and we regularly change our passwords for laptops and devices, surely that\u2019s enough?\u2019
\nNot quite. While it\u2019s true that a strong security policy can help protect your business against regular theft and even less sophisticated cyberattacks, it\u2019s not enough to protect you from the really harmful stuff.<\/p>\n

Hackers are always finding a way around even the strictest security policies and new methods for cracking passwords appear all the time. To be totally sure, you need an a solution that allows you to completely encode everything on your device. This means that even in the event someone does manage to break in, all they\u2019ll be able to extract is random gobbledegook that\u2019s little use to anyone without the right encryption key.<\/p>\n

How do you use encryption?<\/strong><\/h4>\n

Finally, let\u2019s take a look at how you can use encryption to protect your business. Encryption can take many forms. How you use it will depend on what you need it for, but some common uses include:<\/p>\n

End-to-end encryption<\/strong> \u2013 This guarantees data sent between two parties cannot be viewed by anyone else. Most of the internal communication tools such as Slack or Google Hangouts will come with this as standard, but it\u2019s worth checking whichever messaging tool you use.<\/p>\n

Cloud storage encryption<\/strong> \u2013 A service offered by cloud storage providers that transforms your data or text using an algorithm and stores it safely in the cloud.<\/p>\n

Encryption as a Service (EaaS)<\/strong> \u2013 EaaS represents the next step up from cloud storage encryption. It\u2019s the perfect tool for small businesses who want to use encryption but lack the resources to do manage it themselves. EaaS subscription models typically include full-disk, database, and file encryption.<\/p>\n

Of course, these are far from the only uses of encryption. You can also use it to protect certain fields on your website, encrypt everything leaving or entering your web server and a hundred other things besides. The above are just the most common applications for SMEs.<\/p>\n

Data is more important than ever to SMEs. In fact, in our data-driven economy, it\u2019s often the most valuable asset a business possesses. Basic cyber-hygiene such as encryption can go a long way towards helping you protect it.<\/p>\n

Show your customers you value their data by getting certified in Cyber Essentials<\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/em><\/p>\n

\"Get<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

Most of us have heard of encryption. It\u2019s that recipe for secrecy that techy types talk about all the time. But for many of us, that\u2019s where the knowledge ends….<\/p>\n","protected":false},"author":4,"featured_media":6294,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,88,11],"tags":[166,103,9,83,167,168,16],"yoast_head":"\nEncryption explained: how does it work and why do SMEs need it?<\/title>\n<meta name=\"description\" content=\"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Encryption explained: how does it work and why do SMEs need it?\" \/>\n<meta property=\"og:description\" content=\"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-28T10:57:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-03T08:45:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"2560\" \/>\n\t<meta property=\"og:image:height\" content=\"1683\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\"},\"author\":{\"name\":\"Franklin\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\"},\"headline\":\"Encryption explained: how does it work and why do SMEs need it?\",\"datePublished\":\"2020-07-28T10:57:51+00:00\",\"dateModified\":\"2021-10-03T08:45:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\"},\"wordCount\":1143,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg\",\"keywords\":[\"cloud computing\",\"cyber attack\",\"Cyber Essentials\",\"cybersecurity\",\"encryption\",\"password security\",\"SMEs\"],\"articleSection\":[\"Blog\",\"Business resilience\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\",\"name\":\"Encryption explained: how does it work and why do SMEs need it?\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg\",\"datePublished\":\"2020-07-28T10:57:51+00:00\",\"dateModified\":\"2021-10-03T08:45:40+00:00\",\"description\":\"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg\",\"width\":2560,\"height\":1683},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Encryption explained: how does it work and why do SMEs need it?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\",\"name\":\"Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"caption\":\"Franklin\"},\"url\":\"https:\/\/cybersmart.com\/author\/franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Encryption explained: how does it work and why do SMEs need it?","description":"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/","og_locale":"en_US","og_type":"article","og_title":"Encryption explained: how does it work and why do SMEs need it?","og_description":"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?","og_url":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2020-07-28T10:57:51+00:00","article_modified_time":"2021-10-03T08:45:40+00:00","og_image":[{"width":2560,"height":1683,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg","type":"image\/jpeg"}],"author":"Franklin","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Franklin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/"},"author":{"name":"Franklin","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13"},"headline":"Encryption explained: how does it work and why do SMEs need it?","datePublished":"2020-07-28T10:57:51+00:00","dateModified":"2021-10-03T08:45:40+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/"},"wordCount":1143,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg","keywords":["cloud computing","cyber attack","Cyber Essentials","cybersecurity","encryption","password security","SMEs"],"articleSection":["Blog","Business resilience","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/","url":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/","name":"Encryption explained: how does it work and why do SMEs need it?","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg","datePublished":"2020-07-28T10:57:51+00:00","dateModified":"2021-10-03T08:45:40+00:00","description":"Most of us have heard of encryption. But what is it? How can it help your SME improve cybersecurity? And how do you use it?","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/08\/neonbrand-mgYAR7BzBk4-unsplash-scaled.jpg","width":2560,"height":1683},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/encryption-explained-how-does-it-work-and-why-do-smes-need-it\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"Encryption explained: how does it work and why do SMEs need it?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13","name":"Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","caption":"Franklin"},"url":"https:\/\/cybersmart.com\/author\/franklin\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/5864"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=5864"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/5864\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6294"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=5864"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=5864"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=5864"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}