{"id":1908,"date":"2019-02-22T16:08:22","date_gmt":"2019-02-22T16:08:22","guid":{"rendered":"http:\/\/www.kruptos2.co.uk\/blog\/?p=1908"},"modified":"2019-05-22T16:45:59","modified_gmt":"2019-05-22T16:45:59","slug":"encrypted-web-connection-and-its-important","status":"publish","type":"post","link":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/","title":{"rendered":"What is Encrypted Web Connection and Why it\u2019s Important"},"content":{"rendered":"<p class=\"p1\">Encryption is the <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2.html\">process of helping protect personal data<\/a> by using a \u201csecret code\u201d to scramble it so that it cannot be read by anyone who doesn\u2019t have the code key.Encrypted Web Connection is a process through which some or all of the Internet activity initiated from a Web browser is natively encrypted. Encrypted Web connection is used to safeguard a user\u2019s browser activities regardless of the website being accessed.<\/p>\n<p class=\"p1\">Today, vast amounts of personal information are managed online and stored in the cloud or on servers with an ongoing connection to the web.<\/p>\n<p class=\"p1\">It\u2019s nearly impossible to do business of any kind without personal data ending up in a networked computer system, which is why it\u2019s important to know <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-the-sensitive-files-on-your-computer\/\">how to help keep that data private over internet.<\/a><\/p>\n<p class=\"p2\"><b>Enabling encryption via SSL<\/b><\/p>\n<p class=\"p1\">Most legitimate websites use what is called <a href=\"https:\/\/www.globalsign.com\/en-in\/ssl-information-center\/what-is-an-ssl-certificate\/\"><span class=\"s1\">Secure Sockets Layer<\/span>\u00a0(SSL),<\/a> which is a form of encrypting data when it is being sent to and from a website. This keeps attackers from accessing that data while it is in transit.<\/p>\n<p class=\"p1\">Look for the green padlock icon in the URL bar, and the \u201cS\u201d in the \u201chttps:\/\/\u201d to make sure you are conducting secure, encrypted transactions online.<\/p>\n<p class=\"p1\">It\u2019s a good idea to access sites utilizing SSL when:<\/p>\n<ul class=\"ul1\">\n<li class=\"li1\"><b>You store or send sensitive data online.<\/b>\u00a0If you use the Internet to carry out tasks such as filing your taxes, make purchases, renew your driver\u2019s license, or conduct any other personal business, visiting sites utilizing SSL is a wise idea.<\/li>\n<li class=\"li1\"><b>Your work requires it.<\/b>\u00a0Your workplace may have encryption protocols, or it may be subject to regulations that require encryption. In these cases, encryption is a must.<\/li>\n<\/ul>\n<p class=\"p1\"><b>3 reasons why encryption matters<\/b><br \/>\nWhy is encryption important? Here are three reasons:<\/p>\n<p class=\"p1\"><b>1. Internet privacy concerns are real\u00a0<\/b><br \/>\nEncryption <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-protect-your-privacy-on-your-devices\/\">helps protect privacy<\/a> by turning personal information into \u201cfor your eyes only\u201d messages intended only for the parties that need them \u2014 and no one else. <a href=\"http:\/\/www.kruptos2.co.uk\/blog\/how-to-send-encrypted-email-attachments-using-kruptos\/\">You should make sure that your emails<\/a> are being sent over an encrypted connection, or that you are encrypting each message.<\/p>\n<p class=\"p1\">Most email clients come with the option for encryption in the settings menu, and if you check your email with a web browser, take a moment to ensure that SSL encryption is available.<\/p>\n<p class=\"p1\"><b>2. Hacking is big business<\/b><br \/>\nHackers aren\u2019t just bored kids in a basement anymore but they\u2019re big business, and in some cases, they\u2019re multinational outfits. Large-scale data breaches that you may have heard that people are out to steal personal information to fill their pockets.<\/p>\n<p class=\"p1\"><b>3. Regulations demand it\u00a0<\/b><br \/>\nHealthcare providers are required by the Health Insurance Portability and Accountability Act (HIPAA) to implement security features that protect patients\u2019 sensitive health information.<\/p>\n<p class=\"p1\">Institutions of higher learning must take similar steps under the Family Education Rights and Privacy Act (FERPA), while retailers must contend with the Fair Credit Practices Act (FCPA) and similar laws. <a href=\"http:\/\/www.kruptos2.co.uk\/kruptos2mac.html\">Encryption helps individual and businesses<\/a> stay compliant as well as helps protect the valuable data of their customers.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Encryption is the process of helping protect personal data by using a \u201csecret code\u201d to scramble it so that it cannot be read by anyone who doesn\u2019t have the code key.Encrypted Web Connection is a process through which some or all of the Internet activity initiated from a Web browser is natively encrypted. Encrypted Web &hellip;<\/p>\n<p class=\"read-more\"> <a class=\"ast-button\" href=\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\"> <span class=\"screen-reader-text\">What is Encrypted Web Connection and Why it\u2019s Important<\/span> Read More \u00bb<\/a><\/p>\n","protected":false},"author":1,"featured_media":1909,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[8,7,37],"tags":[33,41],"class_list":["post-1908","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-data-protection","category-how-to","category-online-safety","tag-encryption","tag-ssl"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.2 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog<\/title>\n<meta name=\"description\" content=\"This post expains what is encryption, how web traffic is encrypted and why it&#039;s important to encypt the web connection.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog\" \/>\n<meta property=\"og:description\" content=\"This post expains what is encryption, how web traffic is encrypted and why it&#039;s important to encypt the web connection.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\" \/>\n<meta property=\"og:site_name\" content=\"Kruptos Security Blog\" \/>\n<meta property=\"article:published_time\" content=\"2019-02-22T16:08:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2019-05-22T16:45:59+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"225\" \/>\n\t<meta property=\"og:image:height\" content=\"225\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thiru\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thiru\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\"},\"author\":{\"name\":\"Thiru\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\"},\"headline\":\"What is Encrypted Web Connection and Why it\u2019s Important\",\"datePublished\":\"2019-02-22T16:08:22+00:00\",\"dateModified\":\"2019-05-22T16:45:59+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\"},\"wordCount\":513,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg\",\"keywords\":[\"Encryption\",\"SSL\"],\"articleSection\":[\"Data Protection\",\"How To\",\"Online Safety\"],\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\",\"name\":\"What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog\",\"isPartOf\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg\",\"datePublished\":\"2019-02-22T16:08:22+00:00\",\"dateModified\":\"2019-05-22T16:45:59+00:00\",\"description\":\"This post expains what is encryption, how web traffic is encrypted and why it's important to encypt the web connection.\",\"breadcrumb\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#breadcrumb\"},\"inLanguage\":\"en\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg\",\"width\":225,\"height\":225,\"caption\":\"SSL Encryption\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/kruptos2.co.uk\/blog\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What is Encrypted Web Connection and Why it\u2019s Important\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#website\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"name\":\"Kruptos Security Blog\",\"description\":\"The Kruptos Security Blog\",\"publisher\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#organization\",\"name\":\"Kruptos Security Blog\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"contentUrl\":\"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png\",\"width\":200,\"height\":58,\"caption\":\"Kruptos Security Blog\"},\"image\":{\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf\",\"name\":\"Thiru\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en\",\"@id\":\"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g\",\"caption\":\"Thiru\"},\"description\":\"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.\",\"url\":\"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog","description":"This post expains what is encryption, how web traffic is encrypted and why it's important to encypt the web connection.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/","og_locale":"en_US","og_type":"article","og_title":"What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog","og_description":"This post expains what is encryption, how web traffic is encrypted and why it's important to encypt the web connection.","og_url":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/","og_site_name":"Kruptos Security Blog","article_published_time":"2019-02-22T16:08:22+00:00","article_modified_time":"2019-05-22T16:45:59+00:00","og_image":[{"width":225,"height":225,"url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg","type":"image\/jpeg"}],"author":"Thiru","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Thiru","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#article","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/"},"author":{"name":"Thiru","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf"},"headline":"What is Encrypted Web Connection and Why it\u2019s Important","datePublished":"2019-02-22T16:08:22+00:00","dateModified":"2019-05-22T16:45:59+00:00","mainEntityOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/"},"wordCount":513,"commentCount":0,"publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg","keywords":["Encryption","SSL"],"articleSection":["Data Protection","How To","Online Safety"],"inLanguage":"en","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/","url":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/","name":"What is Encrypted Web Connection and Why it\u2019s Important - Kruptos Security Blog","isPartOf":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage"},"thumbnailUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg","datePublished":"2019-02-22T16:08:22+00:00","dateModified":"2019-05-22T16:45:59+00:00","description":"This post expains what is encryption, how web traffic is encrypted and why it's important to encypt the web connection.","breadcrumb":{"@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#breadcrumb"},"inLanguage":"en","potentialAction":[{"@type":"ReadAction","target":["https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/"]}]},{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#primaryimage","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2019\/05\/SSL-Encryption.jpeg","width":225,"height":225,"caption":"SSL Encryption"},{"@type":"BreadcrumbList","@id":"https:\/\/kruptos2.co.uk\/blog\/encrypted-web-connection-and-its-important\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/kruptos2.co.uk\/blog\/"},{"@type":"ListItem","position":2,"name":"What is Encrypted Web Connection and Why it\u2019s Important"}]},{"@type":"WebSite","@id":"https:\/\/kruptos2.co.uk\/blog\/#website","url":"https:\/\/kruptos2.co.uk\/blog\/","name":"Kruptos Security Blog","description":"The Kruptos Security Blog","publisher":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/kruptos2.co.uk\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en"},{"@type":"Organization","@id":"https:\/\/kruptos2.co.uk\/blog\/#organization","name":"Kruptos Security Blog","url":"https:\/\/kruptos2.co.uk\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","contentUrl":"https:\/\/kruptos2.co.uk\/blog\/wp-content\/uploads\/2018\/12\/logo.png","width":200,"height":58,"caption":"Kruptos Security Blog"},"image":{"@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/c4229b0c41d97c89affd312d9ae991cf","name":"Thiru","image":{"@type":"ImageObject","inLanguage":"en","@id":"https:\/\/kruptos2.co.uk\/blog\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/a3bd051206da998bf4e2b7eb0620efff?s=96&r=g","caption":"Thiru"},"description":"As a Security Specialist at Kruptos Security, Thiru has made it his mission to help users understand how cyber security works and why it\u2019s essential for any Internet user in the world. Using his background in Security Engineering, he speaks out relevant subjects and extracts actionable data and identity protection tip and key examples to illustrate them.","url":"https:\/\/kruptos2.co.uk\/blog\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1908","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/comments?post=1908"}],"version-history":[{"count":1,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1908\/revisions"}],"predecessor-version":[{"id":1910,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/posts\/1908\/revisions\/1910"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media\/1909"}],"wp:attachment":[{"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/media?parent=1908"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/categories?post=1908"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/kruptos2.co.uk\/blog\/wp-json\/wp\/v2\/tags?post=1908"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}