{"id":18597,"date":"2021-10-01T11:41:24","date_gmt":"2021-10-01T11:41:24","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18597"},"modified":"2025-05-08T20:02:08","modified_gmt":"2025-05-08T20:02:08","slug":"top-5-data-security-protocols-in-2021","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/","title":{"rendered":"Top 5 Data Security Protocols in 2021"},"content":{"rendered":"<p><span style=\"font-weight: 400;\">Welcome, and have no fear. If you\u2019ve come to this article dreading that 2021 will bring even more data security protocols for your business to comply with, we&#8217;ve got great news. The pandemic \u2013 though obviously awful news in every other way \u2013 has meant that the rush to enact data privacy and security legislation has been put on hold for much of the last year.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The good news is that this year hasn\u2019t brought new regulations for the majority of companies in the US. <\/span><span style=\"font-weight: 400;\">But there <\/span><span style=\"font-weight: 400;\">is some bad news as well. First, the world of cybersecurity continues to develop, and <\/span><a href=\"https:\/\/easydmarc.com\/blog\/cyber-threat-trends-to-watch-out-for-in-2021\/\"><span style=\"font-weight: 400;\">cyber threat trends in 2021<\/span><\/a><span style=\"font-weight: 400;\"> indicate that your data is now under bigger threat than ever before, and that the average cost of a data breach has risen to around $3.86 million. Then there\u2019s the fact that plenty of firms are still struggling to reach and stay compliant with existing data security protocols.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">And so, perhaps we can use the enforced break to get up to speed. Here are the top five data security protocols for US firms in 2021, and a little information about how you can stay compliant with them.<\/span><\/p>\n<h3><b>1. GDPR<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The General Data Protection Regulation (GDPR) or <\/span><a href=\"https:\/\/easydmarc.com\/blog\/gdpr\/\"><span style=\"font-weight: 400;\">GDPR<\/span><\/a><span style=\"font-weight: 400;\"> is, for most companies, by far the most stringent data security protocol. It was put into force back in 2018 by the European Union and was largely focused on giving European citizens increased privacy rights. However, alongside the right to know how their data was being used, the GDPR also puts in place an expectation that companies will protect the data they hold.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">It might sound like a European directive has little to do with US companies, but it does. That\u2019s because it applies to all European citizens \u2013 whether they are physically located in Europe or not, and whether they are looking at a US site or not. That means that, if your website is available outside the USA, you need to check the GDPR requirements. Thankfully, we\u2019ve provided you <\/span><a href=\"https:\/\/easydmarc.com\/blog\/gdpr\/\"><span style=\"font-weight: 400;\">with a handy guide to those here<\/span><\/a><span style=\"font-weight: 400;\">.\u00a0<\/span><\/p>\n<h3><b>2. CMMC<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The Cybersecurity Maturity Model Certification (CMMC) is a much more limited data security protocol than the GDPR. It applies, in fact, \u201conly\u201d to those companies contracting for the US Department of Defense, which sounds like a small subset of companies until you realize just how large the DoD is, and how many companies it does business with. Want to know, for instance, why the <\/span><a href=\"https:\/\/cyberinsider.com\/linkedin-data-leak-700-million-users\/\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">recent LinkedIn data breach<\/span><\/a><span style=\"font-weight: 400;\"> was such a big deal? It\u2019s because LinkedIn is a DoD contractor.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you want to contract for the DoD, this means that the first step you need to undertake is to <\/span><a href=\"https:\/\/blog.rsisecurity.com\/overview-of-cmmc-level-5-requirements\/\"><span style=\"font-weight: 400;\">check the CMMC<\/span><\/a><span style=\"font-weight: 400;\"> and understand what \u201clevel\u201d of \u201cmaturity\u201d you\u2019ll have to reach to put in a tender bid.<\/span><\/p>\n<h3><b>3. HIPAA<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">HIPAA, like the CMMC, only applies to a subset of US companies. In this case, though, it\u2019s quite a large one. HIPAA is designed to protect the personal information collected by US healthcare providers. The law has emerged into greater prominence in recent years with the many health <\/span><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/data-breach\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">data breaches<\/span><\/a><span style=\"font-weight: 400;\"> caused by cyber attacks and <\/span><a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/ransomware\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">ransomware<\/span><\/a><span style=\"font-weight: 400;\"> attacks on health insurers and providers.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">HIPAA is the broadest data security protocol on this list, because it explicitly recognizes that data is now shared in many different ways. This means that in order to reach compliance, companies have to look at a wide range of systems, from their server databases to their <\/span><a href=\"https:\/\/easydmarc.com\/blog\/4-email-security-best-practices-to-protect-your-organization-in-2021\/\"><span style=\"font-weight: 400;\">email security best practices<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<h3><b>4. SEC Guidelines<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">The Securities and Exchange Commission (SEC) is the body that oversees financial markets and companies in the US, and like similar bodies in other sectors they publish their own guidance on data security.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Unfortunately, it\u2019s difficult to give general advice on the SEC guidelines, for two reasons. One is that the range of firms they apply to is so diverse. The other is that they are constantly being updated. This makes it all the more important that you <\/span><a href=\"https:\/\/www.sec.gov\/securities-topics\/cybersecurity\" target=\"_blank\" rel=\"noopener\"><span style=\"font-weight: 400;\">check which SEC guidance applies to you<\/span><\/a><span style=\"font-weight: 400;\"> and, if necessary, get professional (and potentially legal) advice on reaching compliance.<\/span><\/p>\n<h3><b>5. State Regulations<\/b><\/h3>\n<p><span style=\"font-weight: 400;\">Last but definitely not least, be aware that there will soon be a patchwork of state regulations that define and control the way that you collect, store, and process data. Firms in California are already aware of this due to the CCPA, but companies in other states are about to join them. That\u2019s because there are a number of laws currently passing through state legislatures that are modeled after California\u2019s rules.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The California Consumer Privacy Act (CCPA) is a law that allows any California consumer to demand to see all the information a company has saved on them, as well as a full list of all the third parties that data is shared with. In addition, the California law allows consumers to sue companies if the privacy guidelines are violated, even if there is no breach.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">In order to stay on top of these rules, you should read your state press, and make sure you are engaged with the local business community, which will allow you to have prior warning of the new data security protocols that might be passed in your state.<\/span><\/p>\n<h2><b>The Future<\/b><\/h2>\n<p><span style=\"font-weight: 400;\">With the legislative process stalled across the US, this year has brought respite to firms who may be struggling to reach compliance with existing data security protocols. It\u2019s of paramount importance, however, that we don\u2019t waste this chance. Abiding by the data security protocols in this list not only protects you from legal challenge, but as we point out in <\/span><a href=\"https:\/\/easydmarc.com\/blog\/10-insights-on-verizon-2021-dbir\/\"><span style=\"font-weight: 400;\">our Data Breach Investigations Report<\/span><\/a><span style=\"font-weight: 400;\">, it can also mean you are far less likely to be the victim of a cyberattack.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">\u00a0<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Welcome, and have no fear. If you\u2019ve come &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18779,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[448,204,203],"tags":[],"class_list":["post-18597","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-acts-and-regulations","category-blog","category-email-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Top 5 Data Security Protocols in 2021 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Top 5 Data Security Protocols in 2021\" \/>\n<meta property=\"og:description\" content=\"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-01T11:41:24+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-08T20:02:08+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Top 5 Data Security Protocols in 2021\",\"datePublished\":\"2021-10-01T11:41:24+00:00\",\"dateModified\":\"2025-05-08T20:02:08+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/\"},\"wordCount\":953,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-new-01.10.jpg\",\"articleSection\":[\"Acts and Regulations\",\"Blog\",\"Email Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/\",\"name\":\"Top 5 Data Security Protocols in 2021 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-new-01.10.jpg\",\"datePublished\":\"2021-10-01T11:41:24+00:00\",\"dateModified\":\"2025-05-08T20:02:08+00:00\",\"description\":\"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-new-01.10.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/09\\\/top-image-new-01.10.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image new 01.10\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/top-5-data-security-protocols-in-2021\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Email Security\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Acts and Regulations\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/email-security\\\/acts-and-regulations\\\/\"},{\"@type\":\"ListItem\",\"position\":5,\"name\":\"Top 5 Data Security Protocols in 2021\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Top 5 Data Security Protocols in 2021 | EasyDMARC","description":"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/","og_locale":"en_US","og_type":"article","og_title":"Top 5 Data Security Protocols in 2021","og_description":"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?","og_url":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-10-01T11:41:24+00:00","article_modified_time":"2025-05-08T20:02:08+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Top 5 Data Security Protocols in 2021","datePublished":"2021-10-01T11:41:24+00:00","dateModified":"2025-05-08T20:02:08+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/"},"wordCount":953,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","articleSection":["Acts and Regulations","Blog","Email Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/","url":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/","name":"Top 5 Data Security Protocols in 2021 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","datePublished":"2021-10-01T11:41:24+00:00","dateModified":"2025-05-08T20:02:08+00:00","description":"Top 5 data security protocols in 2021: GDPR,CMMC,HIPAA,SEC Guidelines, and State Regulations. what are they and how can you stay compliant with them?","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","width":1440,"height":910,"caption":"top image new 01.10"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/top-5-data-security-protocols-in-2021\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Email Security","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/"},{"@type":"ListItem","position":4,"name":"Acts and Regulations","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/email-security\/acts-and-regulations\/"},{"@type":"ListItem","position":5,"name":"Top 5 Data Security Protocols in 2021"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/09\/top-image-new-01.10.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18597","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18597"}],"version-history":[{"count":4,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18597\/revisions"}],"predecessor-version":[{"id":47371,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18597\/revisions\/47371"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18779"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18597"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18597"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18597"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}