{"id":1800,"date":"2018-07-03T11:58:36","date_gmt":"2018-07-03T11:58:36","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1800"},"modified":"2019-05-30T17:09:40","modified_gmt":"2019-05-30T17:09:40","slug":"10-best-practices-for-securely-using-usb-drives","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/","title":{"rendered":"10 Best Practices for Securely using USB Drives"},"content":{"rendered":"<p class=\"p1\">Do you know how most personal and business data breaches happen? Lost laptops, portable hard drives and USB drives. Here you can learn about 10 best practices for securely using USB drives<\/p>\n<p class=\"p1\">Now many of us have some kind of security practice in place for lost computers and USB drives, whether it\u2019s encrypted drives with remote wipe, or a call lost-and-reporting procedure. But how many of us having USB drive best practices on the books? Not many.<\/p>\n<p class=\"p3\">Yet USBs, because of their size, are more likely to be lost than laptops or smartphones. And loaded with sophisticated malware and virus, USB drives have been used to penetrate some of the world\u2019s most sensitive networks, from the Department of Defense on down.<\/p>\n<p class=\"p3\">The worst military breach in U.S. history occurred a decade ago, in 2008, when a USB flash drive, containing malware,\u00a0<a href=\"https:\/\/www.cnet.com\/news\/bad-flash-drive-caused-worst-u-s-military-breach\/\"><span class=\"s1\">infected the network<\/span><\/a>\u00a0and resulted in the Department of Defense\u2019s sensitive information being leaked.<\/p>\n<p class=\"p3\">USB drives are popular for storing and transporting data easily, but at the same time, this features make them convenient for hackers to introduce security risks. Mostly because an attacker needs physical access to your device in order to infect it.<\/p>\n<p>You may also interested to know about <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/2-ways-to-keep-your-sensitive-files-safe-on-a-usb-drive-or-external-hard-drive\/\">2 simple ways to keep your sensitive files safe on a USB drive.<\/a><\/p>\n<p class=\"p3\">This event was a wake-up call for many in the cyber security space, and efforts have been made to expose the risks that these flash drives create.<\/p>\n<p class=\"p1\">So how do you prevent against lost data or network intrusions associated with USB storage devices or thumb drives?<\/p>\n<p class=\"p1\">Here are the best practices for securely using USB drives for protecting your USB drives,<\/p>\n<p><strong>1. Be careful where you purchase your USB drives from,<\/strong> as some shady third party manufacturers are known to manufacture these devices with malware on them. Always buy your flash drives from reputable, well known manufacturers as well as sellers.<\/p>\n<p><strong>2. Use encrypted USB drives,<\/strong> there are several ways to perform encryption on USBs. You can either purchase the USB flash drives that are hardware encrypted Or you can install <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2go.html\">specialized encryption software on your USB flash drive.<\/a><\/p>\n<p><strong>3. Don\u2019t plug unknown USB drives into your computer,<\/strong> USB Drives that are found in public may be infected with malware or can be purposely configured to download a malicious program onto any computer the USB drive is plugged into. Opening unknown files from unknown sources puts both your computer and your critical information at risk. So do NOT plug it into your computer to see what\u2019s on it.<\/p>\n<p><strong>4. Don\u2019t use the same USB drives for personal and work computers,<\/strong> as you may end up with copying your personal sensitive information to your work computer or vice-versa.<\/p>\n<p><strong>5. Keep the internet security, anti-virus, malware detection softwares on your computer up to date,<\/strong> since software updates\u00a0are very crucial for the security of your computer, as they patch known vulnerabilities.<\/p>\n<p><strong>6. Regularly audit your USB device,\u00a0<\/strong> remove any unneeded old files and possibly, use any data wipe-out tool to delete your data permanently.<\/p>\n<p><strong>7. Make sure to scan your USB first,<\/strong> whenever a thumb drive is plugged in.\u00a0 This can help ensure no malware or malicious programs are on the drive.<\/p>\n<p><strong>8. Take regular backups of your USB devices,<\/strong> ensure that backups are properly safeguarded. It\u2019s also another excellent way to keep track of what information is being moved to and from the device.<\/p>\n<p><strong>9. Use USB drive on a need-to-have basis,\u00a0<\/strong>it will limit exposure and reduce the risk of your critical data being transferred away from you.<\/p>\n<p><strong>10. Have a limited count of the USB devices,<\/strong> list them by purpose and use safely and securely.<\/p>\n<p>Usage of portable media storage devices are still significant in our day to day contemporary life. Ensuring <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">proper data protection<\/a> with a <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\">best practices<\/a> offers significant risk reduction and can prevent data breach. Good Luck, Stay Safe.<\/p>\n\n\n<figure class=\"wp-block-embed-wordpress wp-block-embed is-type-wp-embed is-provider-kruptos-security-blog\"><div class=\"wp-block-embed__wrapper\">\nhttp:\/\/www.kruptos2.co.uk\/blog\/how-to-securely-view-or-edit-your-files-in-usb-drive\/\n<\/div><\/figure>\n","protected":false},"excerpt":{"rendered":"<p>Do you know how most personal and business data breaches happen? Lost laptops, portable hard drives and USB drives. Here you can learn about 10 best practices for securely using USB drives Now many of us have some kind of security practice in place for lost computers and USB drives, whether it\u2019s encrypted drives with &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\"> <span class=\"screen-reader-text\">10 Best Practices for Securely using USB Drives<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":2,"featured_media":1817,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7],"tags":[],"class_list":["post-1800","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>10 Best Practices for Securely using USB Drives - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"10 Best Practices for Securely using USB Drives - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-03T11:58:36+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-30T17:09:40+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"360\" \/>\n\t<meta property=\"og:image:height\" content=\"240\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Candy Ross\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Candy Ross\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\"},\"author\":{\"name\":\"Candy Ross\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\"},\"headline\":\"10 Best Practices for Securely using USB Drives\",\"datePublished\":\"2018-07-03T11:58:36+00:00\",\"dateModified\":\"2019-05-30T17:09:40+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\"},\"wordCount\":658,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg\",\"articleSection\":[\"Data Protection\",\"How To\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\",\"name\":\"10 Best Practices for Securely using USB Drives - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg\",\"datePublished\":\"2018-07-03T11:58:36+00:00\",\"dateModified\":\"2019-05-30T17:09:40+00:00\",\"description\":\"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg\",\"width\":360,\"height\":240,\"caption\":\"best practices for securely using USB drives\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"10 Best Practices for Securely using USB Drives\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb\",\"name\":\"Candy Ross\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g\",\"caption\":\"Candy Ross\"},\"description\":\"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.\",\"sameAs\":[\"http:\/\/www.kruptos2.com\"],\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"10 Best Practices for Securely using USB Drives - Kruptos Security Blog","description":"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/","og_locale":"en_US","og_type":"article","og_title":"10 Best Practices for Securely using USB Drives - Kruptos Security Blog","og_description":"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.","og_url":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/","og_site_name":"Kruptos Security Blog","article_published_time":"2018-07-03T11:58:36+00:00","article_modified_time":"2019-05-30T17:09:40+00:00","og_image":[{"width":360,"height":240,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg","type":"image\/jpeg"}],"author":"Candy Ross","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Candy Ross","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/"},"author":{"name":"Candy Ross","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb"},"headline":"10 Best Practices for Securely using USB Drives","datePublished":"2018-07-03T11:58:36+00:00","dateModified":"2019-05-30T17:09:40+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/"},"wordCount":658,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg","articleSection":["Data Protection","How To"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/","url":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/","name":"10 Best Practices for Securely using USB Drives - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg","datePublished":"2018-07-03T11:58:36+00:00","dateModified":"2019-05-30T17:09:40+00:00","description":"Learn about some of best practices for securely using SB drives. Learn what they are and how to protect your company from USB security threats.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/07\/usb-device-protect.jpg","width":360,"height":240,"caption":"best practices for securely using USB drives"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/10-best-practices-for-securely-using-usb-drives\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"10 Best Practices for Securely using USB Drives"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/6605ad36a69afd43541fdf5db2c4edfb","name":"Candy Ross","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/3935af08699acda73b35968eb5ebc840?s=96&r=g","caption":"Candy Ross"},"description":"As a Cyber Security Enthusiast at Kruptos 2 Software, Candy is passionate about data protection and online privacy. She help users to understand how cyber security works by providing useful guides and tips.","sameAs":["http:\/\/www.kruptos2.com"],"url":"https:\/\/kruptos2.co.uk\/blog\/author\/candy\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1800","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1800"}],"version-history":[{"count":11,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1800\/revisions"}],"predecessor-version":[{"id":1951,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1800\/revisions\/1951"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1817"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1800"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1800"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1800"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}