{"id":6992,"date":"2021-04-30T13:19:21","date_gmt":"2021-04-30T13:19:21","guid":{"rendered":"https:\/\/cybersmart.com\/?p=6992"},"modified":"2021-10-06T12:33:52","modified_gmt":"2021-10-06T12:33:52","slug":"whats-the-difference-between-users-and-admin-users","status":"publish","type":"post","link":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/","title":{"rendered":"What\u2019s the difference between users and admin users?"},"content":{"rendered":"

User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack, but also because of simple confusion.<\/span><\/p>\n

So, to help you understand how it can affect your cybersecurity, we\u2019re delving into the world of user permissions. What are standard and admin users? What are the differences between them? And how are they relevant to<\/span> Cyber Essentials certification<\/span><\/a>?\u00a0<\/span><\/p>\n

What is a user?<\/b><\/h3>\n

A user account is an identity created for a person in a computer or computing system. When you sign up for an online groceries account, that\u2019s creating a user. Likewise, when you first purchased the device your reading this from you likely set yourself up as a user.\u00a0<\/span><\/p>\n

But user accounts don\u2019t have to be created for real, living breathing humans. It\u2019s also possible to create accounts for machines. For example, service accounts for running programs, system accounts for storing system files and processes, and admin accounts for system administration.<\/span><\/p>\n

What is an admin user?<\/b><\/h3>\n

Administrator accounts are created to carry out tasks that require special permissions. You wouldn\u2019t want just anyone in your organisation to be able to install software or access certain confidential files, so setting up admin users allows you to control who can do what.\u00a0<\/span><\/p>\n

These administrator accounts should be regularly audited, including password changes and regular confirmation of the right people\u2019s access.<\/span><\/p>\n

What\u2019s the difference between admin accounts and standard accounts?<\/b><\/h3>\n

Simply put, admin accounts are the most powerful type of user. They have the power to do just about anything on a device. For context, think about the guy or girl in IT who you need to ask to perform tasks like setting up new software.\u00a0 Every device or system will have at least one admin user somewhere.<\/span><\/p>\n

Standard user accounts are much more limited. Just how limited often depends on the type of operating system you use. But, as a rule of thumb, standard accounts can\u2019t typically install new software or access system-critical files. Usually, they can access the files they need for day-to-day work but are prohibited from making serious or permanent changes to their device.\u00a0<\/span><\/p>\n

It\u2019s also important to note that standard accounts are much easier to control than admin users. With user controls, administrators can place much more severe restrictions on accounts \u2013 everything from blocking access to certain applications and websites to setting a daily time limit.\u00a0<\/span><\/p>\n

Although using a standard user account can appear limiting, it does provide security benefits that can protect you in the event of a breach.\u00a0<\/span><\/p>\n

Why are standard accounts more secure than admin accounts?<\/b><\/h3>\n

At first glance, the choice between a user and an admin account might seem like a simple one. After all, who doesn\u2019t want the power to change anything they see fit? <\/span>
\n<\/span>
\n<\/span>However, admin accounts do come with an added security risk. Due to the permissions granted to admin users, if malware is installed on your system an attacker has the power to do virtually anything they want to. In essence, the more permissions your account has, the more damage a cybercriminal can do should they gain access.\u00a0<\/span><\/p>\n

On the other hand, standard accounts offer much less flexibility but greater security. Malware installed under a standard user account is less likely to do serious damage. The hacker won\u2019t be able to make system-level changes or access files other than the user\u2019s own. So when it comes to cybersecurity, having a \u2018lower level\u2019 account can work in your favour.\u00a0<\/span><\/p>\n

Why is it important for administrators to have a standard account?\u00a0<\/b><\/h3>\n

While it\u2019s inevitable there will always be a need for admin accounts in your business, it matters what those accounts are used for. Using an admin account for day-to-day activities like checking your email or browsing the internet dramatically increases the risk of being breached.\u00a0<\/span><\/p>\n

When penetration testers are attempting to compromise a system, they are looking to \u201cgain admin.\u201d And the same principle applies to cybercriminals who also look to gain admin rights to a system or, better still, a <\/span>network<\/span><\/a>.\u00a0<\/span><\/p>\n

Allowing a systems administrator \u2013 especially one with domain administrator privileges \u2013 to access the internet via their admin account presents an easy target for hackers using phishing or impersonation attacks. To counter, consider giving your admin users safer standard accounts for their day-to-day duties.\u00a0<\/span><\/p>\n

How do user permissions relate to Cyber Essentials?\u00a0<\/b><\/h3>\n

User accounts are covered in the Cyber Essentials questionnaire and there are two sections you\u2019ll need to answer.\u00a0<\/span><\/p>\n

User accounts\u00a0<\/b><\/h4>\n

The questions in this section deal with how user accounts are created, who approves the creation, and the processes you have in place for when people leave the organisation or switch roles. They apply to any servers, laptops, tablets or mobile phones used in your business. <\/span>
\n<\/span>
\n<\/span>Cyber Essentials describes best practice for user accounts as:\u00a0<\/span><\/p>\n

It is important to only give users access to all the resources and data necessary for their roles, and no more. All users need to have unique accounts and should not be carrying out day-to-day tasks such as invoicing or dealing with email whilst logged on as a user with administrator privileges which allow significant changes to the way your computer systems work.<\/span><\/p><\/blockquote>\n

 <\/p>\n

Admin accounts\u00a0<\/b><\/h4>\n

The questions in this part of the assessment tackle your processes for choosing and setting up admin users and how regularly access to privileged accounts is audited. Once again, this applies to all servers and devices used in your organisation. <\/span><\/p>\n

 <\/p>\n

How should you set up user permissions in your business?\u00a0<\/b><\/h3>\n

Although every business has different requirements, there are some best practices we recommend you follow. <\/span>
\n<\/span>
\n<\/span>1. For SMEs, we recommend that no more than two people in your business have access to domain admin accounts for whatever software package you use \u2013 for example, Microsoft Office 365 or Google Suite. <\/span>
\n<\/span>
\n<\/span>2. You should regularly audit who has access to these accounts. In the hustle and bustle of daily business, it\u2019s very easy for user permissions to slip and admin accounts to be used by unauthorised staff.\u00a0<\/span><\/p>\n

3. Put in place policies and, if necessary, training to ensure that administrators don\u2019t access the internet or their emails using admin accounts.\u00a0<\/span><\/p>\n

4. Use two-factor authentication<\/a> (2FA) or multi-factor authentication<\/a> (MFA) on both admin and standard user accounts. This adds an extra layer of security for cybercriminals to breach in an attempted attack.<\/p>\n

What about staff working remotely?\u00a0<\/b><\/h3>\n

Things do become slightly trickier in our current working environment, with many businesses working remotely. In many cases, staff working from home will need a local admin account for their device.\u00a0 It\u2019s often more practical for employees to be able to install software or make changes to their machine, rather than asking your IT team to do it remotely.\u00a0<\/span><\/p>\n

Nevertheless, most of the recommendations above still apply. Your people still need to be educated on the importance of using standard accounts for daily work and using MFA.\u00a0<\/span><\/p>\n

That\u2019s all there is to user permissions. Setting up user and admin accounts safely is a simple change, but one that can instantly improve your cybersecurity. Hopefully, this article has helped you better understand how they work and some best practices for keeping your business safe. But, if you have any questions, please get in touch, our team is always on hand to help.\u00a0<\/span><\/p>\n

Looking to improve your cybersecurity but not sure where to begin? Start 2021 the right way, by <\/span>getting certified in Cyber Essentials<\/span><\/a>, the UK government scheme that covers all the fundamentals of cyber hygiene.<\/span><\/p>\n

 <\/p>\n

\"CTA<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"

User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack, but also because of simple confusion….<\/p>\n","protected":false},"author":4,"featured_media":6994,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"inline_featured_image":false,"footnotes":""},"categories":[4,11],"tags":[211,9,83,16,210],"yoast_head":"\nWhat\u2019s the difference between users and admin users? - CyberSmart<\/title>\n<meta name=\"description\" content=\"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What\u2019s the difference between users and admin users? - CyberSmart\" \/>\n<meta property=\"og:description\" content=\"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack\" \/>\n<meta property=\"og:url\" content=\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\" \/>\n<meta property=\"og:site_name\" content=\"CyberSmart\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\" \/>\n<meta property=\"article:published_time\" content=\"2021-04-30T13:19:21+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-06T12:33:52+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1200\" \/>\n\t<meta property=\"og:image:height\" content=\"627\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Franklin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:site\" content=\"@CyberSmartUK\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Franklin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\"},\"author\":{\"name\":\"Franklin\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\"},\"headline\":\"What\u2019s the difference between users and admin users?\",\"datePublished\":\"2021-04-30T13:19:21+00:00\",\"dateModified\":\"2021-10-06T12:33:52+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\"},\"wordCount\":1270,\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg\",\"keywords\":[\"Admin user\",\"Cyber Essentials\",\"cybersecurity\",\"SMEs\",\"User permissions\"],\"articleSection\":[\"Blog\",\"Cyber Security 101\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\",\"url\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\",\"name\":\"What\u2019s the difference between users and admin users? - CyberSmart\",\"isPartOf\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg\",\"datePublished\":\"2021-04-30T13:19:21+00:00\",\"dateModified\":\"2021-10-06T12:33:52+00:00\",\"description\":\"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack\",\"breadcrumb\":{\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg\",\"width\":1200,\"height\":627,\"caption\":\"Admin users\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/cybersmart.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What\u2019s the difference between users and admin users?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#website\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"name\":\"CyberSmart\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#organization\",\"name\":\"CyberSmart\",\"url\":\"https:\/\/cybersmartcom.wpengine.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"contentUrl\":\"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png\",\"width\":990,\"height\":1006,\"caption\":\"CyberSmart\"},\"image\":{\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs\",\"https:\/\/twitter.com\/CyberSmartUK\",\"https:\/\/www.instagram.com\/cybersmart.uk\/\",\"https:\/\/www.linkedin.com\/company\/be-cybersmart\",\"https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13\",\"name\":\"Franklin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g\",\"caption\":\"Franklin\"},\"url\":\"https:\/\/cybersmart.com\/author\/franklin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What\u2019s the difference between users and admin users? - CyberSmart","description":"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/","og_locale":"en_US","og_type":"article","og_title":"What\u2019s the difference between users and admin users? - CyberSmart","og_description":"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack","og_url":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/","og_site_name":"CyberSmart","article_publisher":"https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","article_published_time":"2021-04-30T13:19:21+00:00","article_modified_time":"2021-10-06T12:33:52+00:00","og_image":[{"width":1200,"height":627,"url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg","type":"image\/jpeg"}],"author":"Franklin","twitter_card":"summary_large_image","twitter_creator":"@CyberSmartUK","twitter_site":"@CyberSmartUK","twitter_misc":{"Written by":"Franklin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#article","isPartOf":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/"},"author":{"name":"Franklin","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13"},"headline":"What\u2019s the difference between users and admin users?","datePublished":"2021-04-30T13:19:21+00:00","dateModified":"2021-10-06T12:33:52+00:00","mainEntityOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/"},"wordCount":1270,"publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg","keywords":["Admin user","Cyber Essentials","cybersecurity","SMEs","User permissions"],"articleSection":["Blog","Cyber Security 101"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/","url":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/","name":"What\u2019s the difference between users and admin users? - CyberSmart","isPartOf":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage"},"image":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage"},"thumbnailUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg","datePublished":"2021-04-30T13:19:21+00:00","dateModified":"2021-10-06T12:33:52+00:00","description":"User permissions aren\u2019t normally something we associate with cybersecurity. In part because it isn\u2019t quite as sexy as talking about the latest ransomware attack","breadcrumb":{"@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#primaryimage","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2021\/04\/Copy-of-Social_Images-2.jpg","width":1200,"height":627,"caption":"Admin users"},{"@type":"BreadcrumbList","@id":"https:\/\/cybersmart.com\/blog\/whats-the-difference-between-users-and-admin-users\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/cybersmart.com\/"},{"@type":"ListItem","position":2,"name":"What\u2019s the difference between users and admin users?"}]},{"@type":"WebSite","@id":"https:\/\/cybersmartcom.wpengine.com\/#website","url":"https:\/\/cybersmartcom.wpengine.com\/","name":"CyberSmart","description":"","publisher":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/cybersmartcom.wpengine.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/cybersmartcom.wpengine.com\/#organization","name":"CyberSmart","url":"https:\/\/cybersmartcom.wpengine.com\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/","url":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","contentUrl":"https:\/\/cybersmart.com\/wp-content\/uploads\/2020\/09\/cybersmart-aboutus-mobile.png","width":990,"height":1006,"caption":"CyberSmart"},"image":{"@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/CyberSmartUK\/?ref=br_rs","https:\/\/twitter.com\/CyberSmartUK","https:\/\/www.instagram.com\/cybersmart.uk\/","https:\/\/www.linkedin.com\/company\/be-cybersmart","https:\/\/www.youtube.com\/channel\/UC620w4R_UG_P4ncd_9azlHg"]},{"@type":"Person","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/68ee13ff2d8e9852b17cdf67b4770f13","name":"Franklin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/cybersmartcom.wpengine.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/4ff3b610ad92b2d5a0d39f3a3b5a61db?s=96&d=mm&r=g","caption":"Franklin"},"url":"https:\/\/cybersmart.com\/author\/franklin\/"}]}},"_links":{"self":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6992"}],"collection":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/comments?post=6992"}],"version-history":[{"count":0,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/posts\/6992\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media\/6994"}],"wp:attachment":[{"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/media?parent=6992"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/categories?post=6992"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cybersmart.com\/wp-json\/wp\/v2\/tags?post=6992"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}