{"id":18985,"date":"2021-10-14T13:48:00","date_gmt":"2021-10-14T13:48:00","guid":{"rendered":"https:\/\/easydmarc.com\/blog\/?p=18985"},"modified":"2023-04-28T07:20:22","modified_gmt":"2023-04-28T07:20:22","slug":"digital-and-physical-data-security","status":"publish","type":"post","link":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/","title":{"rendered":"Digital And Physical Data Security: Module 4"},"content":{"rendered":"<h3><span style=\"font-weight: 400;\">What is device encryption and how does it work?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">The process of scrambling data on the device and making it unreadable to anyone who doesn\u2019t have a password or a recovery key is called device encryption. If your device encryption is turned on, the information on your device can only be accessed by users who\u2019ve been authorized.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">All devices contain some level of sensitive data, so it\u2019s crucial to keep your information secure from hackers. If the device is encoded using an encryption algorithm, other people won\u2019t be able to read it, if they manage to gain physical access. However, if your password is weak, it makes your device vulnerable, and the encryption won\u2019t be of any help.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">How to encrypt your devices?<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Each device type has its own encryption method. Most smartphones have the encryption option in their settings, while desktop computers might need a specific application (such as BitLocker) installed. We suggest you talk to your IT manager before choosing any device encryption method.<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">The drawbacks of the device encryption<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">Although device encryption is often helpful, it also has some downsides.<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Forgetting your passwords for an encrypted device can cause permanent loss of access to your data.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Enabled encryption usually slows down the performance of a device. This is undoubtedly something to think about, as it can be quite uncomfortable for busy people.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">So, we suggest you only encrypt those files or devices that contain sensitive information.<\/span><\/p>\n<h2><span style=\"font-weight: 400;\">Keep Your Physical Records and Workstations Safe<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">Physical security is fundamental to all security efforts. Without it, it\u2019s far more difficult to protect other security systems. So, apart from securing your digital data, you need to be cautious about all types of physical documents and workstations.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">We\u2019ve sorted out eight main ways that are proven to help you safeguard your physical records and workstations.<\/span><\/p>\n<ol>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">It\u2019s vital to utilize a lock to the filing cabinets and workstations that contain any type of confidential information. This way you\u2019ll be certain that only those who are allowed to access the cabinet\u2019s contents can do so. Also, it will decrease the risk of a physical data breach. The same refers to the office door when the workday is over.<\/span><\/span><\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Don\u2019t leave any important documents on your desk and workstation, when you are out of the office.<\/span><\/span><\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Whenever you intend to throw away documents to the recycle bin, shred the confidential files first so that it doesn\u2019t fall into the wrong hands and become disastrous for your company.<\/span><\/span><\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Shoulder surfing is an essential part of physical security. Arrange computer screens, whiteboards, and files in a way so that unauthorized team members or other people aren\u2019t able to see and read the contents of those documents.<\/span><\/span><\/span><\/li>\n<li><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Never lend your ID and key to outsiders or even your colleagues. Be cautious about escorting outsiders and guests into the building. If anyone needs to enter the building, suggest they talk with the guards.<\/span><\/span><\/span><\/li>\n<li><span style=\"font-weight: 400;\">If you noticed that you lost your keys or IDs, then report immediately to the corresponding personnel.<\/span><\/li>\n<\/ol>\n<h2><span style=\"font-weight: 400;\">Data and Material Destruction<\/span><\/h2>\n<p><span style=\"font-weight: 400;\">This is indispensable for every business, as confidential information and document destruction help protect not only the company but its customers and partners. Many companies have an established document policy that includes the following requirements:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Return each document to its owner.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">When you\u2019re sure that the paper files and documents aren\u2019t of any use anymore, shred them.<\/span><\/li>\n<li style=\"font-weight: 400;\" aria-level=\"1\"><span style=\"font-weight: 400;\">Consider destroying data stored on electronic devices, such as hard drives.<\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">Before disposing of any document, make sure that the latter may not be needed for a government investigation or lawsuit in the future. State and federal laws prohibit changing or destroying any files that can be useful for official proceedings. Also, we suggest you learn about your company\u2019s policies about document retention before destroying anything.\u00a0<\/span><\/p>\n<h3><span style=\"font-weight: 400;\">Final Thoughts<\/span><\/h3>\n<p><span style=\"font-weight: 400;\">In these four modules, we have presented the main basic steps you can take to secure your data and devices. Start using our tips today to avoid data leakage tomorrow.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">If you haven\u2019t managed to read the previous three modules, then spare some ten minutes to learn about all the best practices for device and account protection.<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>What is device encryption and how does it &#8230;<\/p>\n","protected":false},"author":1,"featured_media":18986,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"inline_featured_image":false,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[204,199],"tags":[],"class_list":["post-18985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog","category-cybersecurity"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO Premium plugin v27.3 (Yoast SEO v27.3) - https:\/\/yoast.com\/product\/yoast-seo-premium-wordpress\/ -->\n<title>Digital And Physical Data Security: Module 4 | EasyDMARC<\/title>\n<meta name=\"description\" content=\"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Digital And Physical Data Security: Module 4\" \/>\n<meta property=\"og:description\" content=\"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/\" \/>\n<meta property=\"og:site_name\" content=\"EasyDMARC\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/EasyDMARC\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-14T13:48:00+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-04-28T07:20:22+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1440\" \/>\n\t<meta property=\"og:image:height\" content=\"910\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"EasyDMARC\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:site\" content=\"@easydmarc\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"EasyDMARC\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/\"},\"author\":{\"name\":\"EasyDMARC\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\"},\"headline\":\"Digital And Physical Data Security: Module 4\",\"datePublished\":\"2021-10-14T13:48:00+00:00\",\"dateModified\":\"2023-04-28T07:20:22+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/\"},\"wordCount\":710,\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/top-image-new-13.10-1.jpg\",\"articleSection\":[\"Blog\",\"Cybersecurity\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/\",\"name\":\"Digital And Physical Data Security: Module 4 | EasyDMARC\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/top-image-new-13.10-1.jpg\",\"datePublished\":\"2021-10-14T13:48:00+00:00\",\"dateModified\":\"2023-04-28T07:20:22+00:00\",\"description\":\"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#primaryimage\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/top-image-new-13.10-1.jpg\",\"contentUrl\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/top-image-new-13.10-1.jpg\",\"width\":1440,\"height\":910,\"caption\":\"top image new 13.10 1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/digital-and-physical-data-security\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Blog\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Cybersecurity\",\"item\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/category\\\/blog\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Digital And Physical Data Security: Module 4\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/\",\"name\":\"EasyDMARC\",\"description\":\"Blog\",\"publisher\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/#organization\",\"name\":\"EasyDMARC\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/easydmarc.com\\\/img\\\/logo.png\"},\"image\":{\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/EasyDMARC\\\/\",\"https:\\\/\\\/x.com\\\/easydmarc\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/easydmarc\\\/mycompany\\\/\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/#\\\/schema\\\/person\\\/449261e9810b270cc697c7c9c5b89e97\",\"name\":\"EasyDMARC\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g\",\"caption\":\"EasyDMARC\"},\"url\":\"https:\\\/\\\/easydmarc.com\\\/blog\\\/author\\\/easydmarc\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO Premium plugin. -->","yoast_head_json":{"title":"Digital And Physical Data Security: Module 4 | EasyDMARC","description":"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/","og_locale":"en_US","og_type":"article","og_title":"Digital And Physical Data Security: Module 4","og_description":"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.","og_url":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/","og_site_name":"EasyDMARC","article_publisher":"https:\/\/www.facebook.com\/EasyDMARC\/","article_published_time":"2021-10-14T13:48:00+00:00","article_modified_time":"2023-04-28T07:20:22+00:00","og_image":[{"width":1440,"height":910,"url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","type":"image\/jpeg"}],"author":"EasyDMARC","twitter_card":"summary_large_image","twitter_creator":"@easydmarc","twitter_site":"@easydmarc","twitter_misc":{"Written by":"EasyDMARC","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#article","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/"},"author":{"name":"EasyDMARC","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97"},"headline":"Digital And Physical Data Security: Module 4","datePublished":"2021-10-14T13:48:00+00:00","dateModified":"2023-04-28T07:20:22+00:00","mainEntityOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/"},"wordCount":710,"publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","articleSection":["Blog","Cybersecurity"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/","url":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/","name":"Digital And Physical Data Security: Module 4 | EasyDMARC","isPartOf":{"@id":"https:\/\/easydmarc.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#primaryimage"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#primaryimage"},"thumbnailUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","datePublished":"2021-10-14T13:48:00+00:00","dateModified":"2023-04-28T07:20:22+00:00","description":"Learn about device encryption and keep your physical records safe. See what you can do to ensure your digital and physical data security.","breadcrumb":{"@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#primaryimage","url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","contentUrl":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","width":1440,"height":910,"caption":"top image new 13.10 1"},{"@type":"BreadcrumbList","@id":"https:\/\/easydmarc.com\/blog\/digital-and-physical-data-security\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/easydmarc.com\/"},{"@type":"ListItem","position":2,"name":"Blog","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/"},{"@type":"ListItem","position":3,"name":"Cybersecurity","item":"https:\/\/easydmarc.com\/blog\/category\/blog\/cybersecurity\/"},{"@type":"ListItem","position":4,"name":"Digital And Physical Data Security: Module 4"}]},{"@type":"WebSite","@id":"https:\/\/easydmarc.com\/blog\/#website","url":"https:\/\/easydmarc.com\/blog\/","name":"EasyDMARC","description":"Blog","publisher":{"@id":"https:\/\/easydmarc.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/easydmarc.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/easydmarc.com\/#organization","name":"EasyDMARC","url":"https:\/\/easydmarc.com\/","logo":{"@type":"ImageObject","url":"https:\/\/easydmarc.com\/img\/logo.png"},"image":{"@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/EasyDMARC\/","https:\/\/x.com\/easydmarc","https:\/\/www.linkedin.com\/company\/easydmarc\/mycompany\/"]},{"@type":"Person","@id":"https:\/\/easydmarc.com\/blog\/#\/schema\/person\/449261e9810b270cc697c7c9c5b89e97","name":"EasyDMARC","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/fcbf1ca829f8e0977fce524da20caa8a528368d0909ce48741526046e5113259?s=96&r=g","caption":"EasyDMARC"},"url":"https:\/\/easydmarc.com\/blog\/author\/easydmarc\/"}]}},"jetpack_featured_media_url":"https:\/\/easydmarc.com\/blog\/wp-content\/uploads\/2021\/10\/top-image-new-13.10-1.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/comments?post=18985"}],"version-history":[{"count":0,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/posts\/18985\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media\/18986"}],"wp:attachment":[{"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/media?parent=18985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/categories?post=18985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/easydmarc.com\/blog\/wp-json\/wp\/v2\/tags?post=18985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}