{"id":10985,"date":"2020-10-23T15:08:29","date_gmt":"2020-10-23T15:08:29","guid":{"rendered":"https:\/\/jboitnott.com\/?p=10985"},"modified":"2020-10-23T15:45:02","modified_gmt":"2020-10-23T15:45:02","slug":"cybersecurity-tips-for-your-small-business","status":"publish","type":"post","link":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/","title":{"rendered":"Cybersecurity Tips For Your Small Business"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Hackers are increasingly targeting <a href=\"https:\/\/jboitnott.com\/zh\/category\/small-business\/\">small businesses<\/a>. When setting up their companies, many entrepreneurs focus on growth and cost savings at the expense of cybersecurity. Thus, small and medium enterprises are often the least prepared for attacks.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">By failing to secure your data environment, you become an easy target for cybercriminals. Therefore, it\u2019s essential to protect your small business from hackers, and here are some tips that can help you navigate the domain of cyber threats.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Have a Backup for All Your Files<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As small as your business might be, it still might collect large volumes of private data and personally identifiable information from its clients, employees, and vendors. The company\u2019s data is also important and needs to be safeguarded. It\u2019s a no-brainer that you should never store anything you cannot afford to lose in one device or location.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Besides having an external backup drive, consider the many cloud storage platforms you have at your disposal as mart of your cybersecurity plan. If cybercriminals steal your sensitive data and you have a backup, it will be easy for your business to recover from the breach. The same cannot be said of those small business owners who don\u2019t have a firewall or data backup plan.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Data Encryption<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Backing up your data on external drives or the cloud can only be a safe option if the backed up data is secure. To safeguard your data further, it\u2019s best to encrypt it. Similarly, encrypt all company emails containing sensitive or private information such as payment card details, social security numbers, and clients\u2019 contact details. If your data is encrypted, it won\u2019t be useful to cybercriminals even if they penetrate your network and steal it.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Train Your Employees<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Most cyber-attacks that involve small businesses are caused by human error. You may have an experienced IT department, run by people with experience in dealing with malware, ransomware, phishing attacks, data breaches and more. But, if other <a href=\"https:\/\/jboitnott.com\/zh\/tag\/employees\/\">employees<\/a> know nothing about cybersecurity threats, they may be the weak link in your cyberspace. Employees can inadvertently cause cybersecurity breaches if you fail to train them properly about their roles in preventing attacks.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Cybersecurity awareness training should <\/span><a href=\"https:\/\/reciprocitylabs.com\/resources\/what-is-security-awareness-training\/\"><span style=\"font-weight: 400;\">focus on detecting an attack<\/span><\/a><span style=\"font-weight: 400;\">, reporting suspicious incidents, and how to react when an attack occurs. You should also train them on how to use their login credentials responsibly. It\u2019s equally important to ensure that everyone understands how to use the company\u2019s IT resources responsibly and the penalties for failing to adhere to the laid-down security protocols.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Small Business Cybersecurity: Establish Clear Protocols<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">You cannot protect your small business from attacks if you don\u2019t have well-defined cybersecurity policies in place. Before you even being operations, sit down with an IT expert and create a cybersecurity strategy for securing your hardware and network. Lay down internal cybersecurity rules that employees, vendors, and other stakeholders will follow once you&#8217;re operational.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Also, decide on the software that you will use for your IT environment. Avoid going for the minimal, more so if your business handles sensitive information such as medical, legal, and financial data. Some of the cybersecurity best practices\u00a0 that you should keep in mind include:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Deciding on the frequency of running security scans and software updates.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Defining which of your data is critical data.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Deciding on the types of software protection that are crucial, and which ones are optional. For example, make sure to address multi-factor authentication, antivirus software, wi-fi network security, and more.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Choosing how to train employees and user accounts that will have admin privileges.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Once you\u2019ve established best defenses for your company, revisit it regularly, and make updates where necessary. Keep in mind that your cybersecurity protocols will only prevent cyber attacks if everyone follows it.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Have A Strong Password Policy<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Some of the most common cybercrime results from the use of simple, generic passwords that are easy to guess. Most people know they should change passwords or make them more complex, but unfortunately, they don\u2019t do it. Password practices go a long way in preventing security breaches. It all starts with implementing a strong password policy. When it comes to securing your business data, it\u2019s best to take time and follow these basics:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Use long passwords (at least 12 characters).<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Avoid using pet names, birthdays, your kids\u2019 names, or passwords that you use elsewhere.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Include a mix of numbers, symbols, letters, lowercase letters, and capitals.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t write your passwords on notebooks on Post-It stickers.<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Change passwords regularly (every three months).<\/span><\/li>\n<\/ul>\n<h2><span style=\"font-weight: 400;\">Monitor Personal Devices<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Many small businesses don\u2019t have the resources to provide mobile devices or laptops to employees. As a result, employees often use their personal gadgets to access company data, especially as more people work from home. Nonetheless, this puts your company data at risk because it\u2019s hard to monitor what employees do with their devices. To avoid this situation, implement a policy that lets your IT staff install monitoring software on employees\u2019 devices.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Key Takeaways<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">As cybersecurity incidents keep rising, it\u2019s becoming increasingly essential to safeguard your network. An attack can deal a significant blow to your small business. So, do whatever it takes to keep attackers at bay, rather than wait for your system to get breached.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><em class=\"us\">Thanks for reading!\u00a0<em>Sign up to get my stories and online courses by\u00a0<\/em><a href=\"https:\/\/jboitnott.com\/zh\/media-coverage-online-course\/\" target=\"_blank\" rel=\"nofollow noopener noreferrer\"><em>clicking here<\/em><\/a><em>.\u00a0<\/em><\/em><\/p>","protected":false},"excerpt":{"rendered":"<p>Hackers are increasingly targeting small businesses. When setting up their companies, many entrepreneurs focus on growth and cost savings at the expense of cybersecurity. Thus, small and medium enterprises are often the least prepared for attacks.\u00a0 By failing to secure your data environment, you become an easy target for cybercriminals. Therefore, it\u2019s essential to protect [&hellip;]<\/p>\n","protected":false},"author":10,"featured_media":10993,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[729],"tags":[730,269],"class_list":["post-10985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersecurity","tag-cybersecurity","tag-small-business"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Cybersecurity Tips For Your Small Business - John Boitnott<\/title>\n<meta name=\"description\" content=\"Entrepreneurs don&#039;t always concentrate on cybersecurity as part of their plans. Here&#039;s how to change that to the benefit of your business.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/\" \/>\n<meta property=\"og:locale\" content=\"zh_CN\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Cybersecurity Tips For Your Small Business - John Boitnott\" \/>\n<meta property=\"og:description\" content=\"Entrepreneurs don&#039;t always concentrate on cybersecurity as part of their plans. Here&#039;s how to change that to the benefit of your business.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/\" \/>\n<meta property=\"og:site_name\" content=\"John Boitnott\" \/>\n<meta property=\"article:published_time\" content=\"2020-10-23T15:08:29+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-10-23T15:45:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"426\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"jboitnott staff\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"jboitnott staff\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 \u5206\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/\"},\"author\":{\"name\":\"jboitnott staff\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#\\\/schema\\\/person\\\/2734d480b0584db63a5beea5e963c9af\"},\"headline\":\"Cybersecurity Tips For Your Small Business\",\"datePublished\":\"2020-10-23T15:08:29+00:00\",\"dateModified\":\"2020-10-23T15:45:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/\"},\"wordCount\":899,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jboitnott.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cybersecurity-woman-at-laptop-min.jpg\",\"keywords\":[\"cybersecurity\",\"small business\"],\"articleSection\":[\"Cybersecurity\"],\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/\",\"url\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/\",\"name\":\"Cybersecurity Tips For Your Small Business - John Boitnott\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/jboitnott.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cybersecurity-woman-at-laptop-min.jpg\",\"datePublished\":\"2020-10-23T15:08:29+00:00\",\"dateModified\":\"2020-10-23T15:45:02+00:00\",\"description\":\"Entrepreneurs don't always concentrate on cybersecurity as part of their plans. Here's how to change that to the benefit of your business.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#breadcrumb\"},\"inLanguage\":\"zh-Hans\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#primaryimage\",\"url\":\"https:\\\/\\\/jboitnott.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cybersecurity-woman-at-laptop-min.jpg\",\"contentUrl\":\"https:\\\/\\\/jboitnott.com\\\/wp-content\\\/uploads\\\/2020\\\/10\\\/cybersecurity-woman-at-laptop-min.jpg\",\"width\":640,\"height\":426,\"caption\":\"cybersecurity, woman at laptop\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/zh\\\/cybersecurity-tips-for-your-small-business\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/jboitnott.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Cybersecurity Tips For Your Small Business\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#website\",\"url\":\"https:\\\/\\\/jboitnott.com\\\/\",\"name\":\"John Boitnott\",\"description\":\"Journalist and Digital Consultant\",\"publisher\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/jboitnott.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-Hans\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#organization\",\"name\":\"John Boitnott\",\"url\":\"https:\\\/\\\/jboitnott.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/secureservercdn.net\\\/50.62.194.59\\\/hva.6c9.myftpupload.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/JBoitnottLogoBlackTransparent_466b9d7fe55bf906733c5219b1e90fda.png?time=1618442616\",\"contentUrl\":\"https:\\\/\\\/secureservercdn.net\\\/50.62.194.59\\\/hva.6c9.myftpupload.com\\\/wp-content\\\/uploads\\\/2018\\\/12\\\/JBoitnottLogoBlackTransparent_466b9d7fe55bf906733c5219b1e90fda.png?time=1618442616\",\"width\":342,\"height\":77,\"caption\":\"John Boitnott\"},\"image\":{\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/jboitnott.com\\\/#\\\/schema\\\/person\\\/2734d480b0584db63a5beea5e963c9af\",\"name\":\"jboitnott staff\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-Hans\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g\",\"caption\":\"jboitnott staff\"},\"description\":\"JBoitnott.com staff\",\"sameAs\":[\"https:\\\/\\\/jboitnott.com\\\/\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Cybersecurity Tips For Your Small Business - John Boitnott","description":"Entrepreneurs don't always concentrate on cybersecurity as part of their plans. Here's how to change that to the benefit of your business.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/","og_locale":"zh_CN","og_type":"article","og_title":"Cybersecurity Tips For Your Small Business - John Boitnott","og_description":"Entrepreneurs don't always concentrate on cybersecurity as part of their plans. Here's how to change that to the benefit of your business.","og_url":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/","og_site_name":"John Boitnott","article_published_time":"2020-10-23T15:08:29+00:00","article_modified_time":"2020-10-23T15:45:02+00:00","og_image":[{"width":640,"height":426,"url":"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg","type":"image\/jpeg"}],"author":"jboitnott staff","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"jboitnott staff","\u9884\u8ba1\u9605\u8bfb\u65f6\u95f4":"4 \u5206"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#article","isPartOf":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/"},"author":{"name":"jboitnott staff","@id":"https:\/\/jboitnott.com\/#\/schema\/person\/2734d480b0584db63a5beea5e963c9af"},"headline":"Cybersecurity Tips For Your Small Business","datePublished":"2020-10-23T15:08:29+00:00","dateModified":"2020-10-23T15:45:02+00:00","mainEntityOfPage":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/"},"wordCount":899,"commentCount":0,"publisher":{"@id":"https:\/\/jboitnott.com\/#organization"},"image":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg","keywords":["cybersecurity","small business"],"articleSection":["Cybersecurity"],"inLanguage":"zh-Hans","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/","url":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/","name":"Cybersecurity Tips For Your Small Business - John Boitnott","isPartOf":{"@id":"https:\/\/jboitnott.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#primaryimage"},"image":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#primaryimage"},"thumbnailUrl":"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg","datePublished":"2020-10-23T15:08:29+00:00","dateModified":"2020-10-23T15:45:02+00:00","description":"Entrepreneurs don't always concentrate on cybersecurity as part of their plans. Here's how to change that to the benefit of your business.","breadcrumb":{"@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#breadcrumb"},"inLanguage":"zh-Hans","potentialAction":[{"@type":"ReadAction","target":["https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/"]}]},{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#primaryimage","url":"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg","contentUrl":"https:\/\/jboitnott.com\/wp-content\/uploads\/2020\/10\/cybersecurity-woman-at-laptop-min.jpg","width":640,"height":426,"caption":"cybersecurity, woman at laptop"},{"@type":"BreadcrumbList","@id":"https:\/\/jboitnott.com\/zh\/cybersecurity-tips-for-your-small-business\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/jboitnott.com\/"},{"@type":"ListItem","position":2,"name":"Cybersecurity Tips For Your Small Business"}]},{"@type":"WebSite","@id":"https:\/\/jboitnott.com\/#website","url":"https:\/\/jboitnott.com\/","name":"John Boitnott","description":"Journalist and Digital Consultant","publisher":{"@id":"https:\/\/jboitnott.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/jboitnott.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-Hans"},{"@type":"Organization","@id":"https:\/\/jboitnott.com\/#organization","name":"John Boitnott","url":"https:\/\/jboitnott.com\/","logo":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/jboitnott.com\/#\/schema\/logo\/image\/","url":"https:\/\/secureservercdn.net\/50.62.194.59\/hva.6c9.myftpupload.com\/wp-content\/uploads\/2018\/12\/JBoitnottLogoBlackTransparent_466b9d7fe55bf906733c5219b1e90fda.png?time=1618442616","contentUrl":"https:\/\/secureservercdn.net\/50.62.194.59\/hva.6c9.myftpupload.com\/wp-content\/uploads\/2018\/12\/JBoitnottLogoBlackTransparent_466b9d7fe55bf906733c5219b1e90fda.png?time=1618442616","width":342,"height":77,"caption":"John Boitnott"},"image":{"@id":"https:\/\/jboitnott.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/jboitnott.com\/#\/schema\/person\/2734d480b0584db63a5beea5e963c9af","name":"jboitnott staff","image":{"@type":"ImageObject","inLanguage":"zh-Hans","@id":"https:\/\/secure.gravatar.com\/avatar\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/6403f80691d322a51f28fe56467799dfaa07625addf68de81926bd4c0b58fab7?s=96&d=mm&r=g","caption":"jboitnott staff"},"description":"JBoitnott.com staff","sameAs":["https:\/\/jboitnott.com\/"]}]}},"_links":{"self":[{"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/posts\/10985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/users\/10"}],"replies":[{"embeddable":true,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/comments?post=10985"}],"version-history":[{"count":0,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/posts\/10985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/media\/10993"}],"wp:attachment":[{"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/media?parent=10985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/categories?post=10985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jboitnott.com\/zh\/wp-json\/wp\/v2\/tags?post=10985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}