{"id":48174,"date":"2016-03-15T21:00:34","date_gmt":"2016-03-16T04:00:34","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=48174"},"modified":"2025-06-04T02:26:45","modified_gmt":"2025-06-04T09:26:45","slug":"report-highlights-enterprise-biometric-vulnerabilities-opportunities","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/","title":{"rendered":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-48175\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg\" alt=\"Bio Vulns - crop\" width=\"700\" height=\"400\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Bio-Vulns-crop.jpg 700w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Bio-Vulns-crop-300x171.jpg 300w\" sizes=\"auto, (max-width: 700px) 100vw, 700px\" \/><\/p>\n<p>Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are difficult to integrate into legacy systems. Biometrics may be a better path to improve security while not adversely impacting the user experience. But there are risks; biometric systems are not without vulnerabilities themselves.<\/p>\n<p>ABI Research has recently published an infographic showing a comprehensive view of biometric system vulnerabilities as well as a whitepaper talking to the recommendations for enterprise environments.<\/p>\n<p>The traditional username-password method is entrenched in most businesses, but in desperate need of improvement. The\u00a0reliance on passwords to gain access to devices, networks, and data is proving to be weaker as attackers are getting better at undermining them. Passwords can be hacked, social engineered, and are a major source of vulnerabilities. Once compromised, they open a vast number of doors for attackers.<\/p>\n<p>Passwords alone are simply not good enough. Users as well as system administrators find them difficult to manage. Changing the status quo is difficult, as the majority of business processes are built to support passwords and workers typically adverse to new security practices.<\/p>\n<p>Biometrics have been in use for some time in limited ways. Considerable advances have prepared the technologies to meet some of the challenges to broader adoption. These steps have created very complex ecosystems to satisfy a variety of demands. But like any technical authentication system, there are potential vulnerabilities at every step. The key to improved biometrics security may be to simplify the technology to lessen the number of vulnerable points of attack. Cost, user experience, and risk aspects must be recognized and proactively addressed for any additional controls.<\/p>\n<h2><strong>Reducing risk<\/strong><\/h2>\n<p>Multifactor authentication reduces the risk of compromise because\u00a0it does not suffer from the reliance on just one method to grant access. Attackers must compromise at least two controls. The downside is that by adding additional factors, multifactor authentication\u00a0can undermine the user experience to the point of affecting productivity and acceptability. Having biometrics satisfy one of the factors in multifactor authentication holds the potential for\u00a0reducing the friction users must endure, while improving the overall security of the system.<\/p>\n<h2><strong>User experience<\/strong><\/h2>\n<p>Automating the awareness of users can make authentication a seamless experience. We always carry our biometrics with us. There&#8217;s nothing to forget, lose, or break. Advanced technology can make the process even easier, such as tracking a user&#8217;s face while at work. A system can be aware so that when the user walks away the machine will lock the screen. Conversely, when the user returns, the system can recognize the face and automatically unlock the system. Such an experience is beneficial to the user while keeping the device safer.<\/p>\n<h2><strong>Managing costs<\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"alignright wp-image-48176\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B.png\" alt=\"SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B\" width=\"269\" height=\"173\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B.png 1200w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B-300x193.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B-768x495.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/SSG_16_02_EvangelistProgram_CyberSecurityImages_Final_B-1024x660.png 1024w\" sizes=\"auto, (max-width: 269px) 100vw, 269px\" \/>Nobody wants to spend money on identity security. Yet there are a plethora of peripherals and secondary devices that\u00a0enterprises purchase, maintain, manage, and service. Fingerprint scanners, hardware card readers, and digital USB keys are popular but incur additional costs and frustrate users who have to carry the gadgets and cables. What if devices themselves had integrated and trusted components that\u00a0could do the authentication work? Specialized cameras, microphones, fingerprint scanners, and electronics to securely match the profiles on the machine may be the path forward. <a href=\"https:\/\/www.mcafee.com\/en-us\/consumer-support\/pc-optimizer.html\">Hardware that\u00a0is optimized and secured<\/a>, supplanting the need for users to deal with secondary peripherals, could lower the overall total cost of ownership for enterprises.<\/p>\n<p>Is biometrics the answer? It is certainly one answer that\u00a0is growing in popularity with organizations seeking better security, employee productivity, and paths to reduce costs.<\/p>\n<p>&nbsp;<\/p>\n<p>Interested in more?\u00a0 Follow me on\u00a0<a href=\"https:\/\/twitter.com\/Matt_Rosenquist\">Twitter (@Matt_Rosenquist)<\/a>\u00a0and\u00a0<a href=\"https:\/\/www.linkedin.com\/today\/author\/matthewrosenquist\">LinkedIn<\/a>\u00a0to hear insights and what is going on in cybersecurity.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede&#8230;<\/p>\n","protected":false},"author":695,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[1814,4452,338],"coauthors":[4136],"class_list":["post-48174","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-computer-security","tag-cybersecurity","tag-endpoint-protection"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-03-16T04:00:34+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-04T09:26:45+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Bio-Vulns-crop.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"700\" \/>\n\t<meta property=\"og:image:height\" content=\"400\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee Labs\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee_Labs\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee Labs\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\"},\"author\":{\"name\":\"McAfee Labs\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\"},\"headline\":\"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities\",\"datePublished\":\"2016-03-16T04:00:34+00:00\",\"dateModified\":\"2025-06-04T09:26:45+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\"},\"wordCount\":622,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg\",\"keywords\":[\"computer security\",\"cybersecurity\",\"endpoint protection\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\",\"name\":\"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg\",\"datePublished\":\"2016-03-16T04:00:34+00:00\",\"dateModified\":\"2025-06-04T09:26:45+00:00\",\"description\":\"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage\",\"url\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg\",\"contentUrl\":\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad\",\"name\":\"McAfee Labs\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg\",\"caption\":\"McAfee Labs\"},\"description\":\"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee_Labs\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog","description":"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog","og_description":"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-03-16T04:00:34+00:00","article_modified_time":"2025-06-04T09:26:45+00:00","og_image":[{"width":700,"height":400,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Bio-Vulns-crop.jpg","type":"image\/jpeg"}],"author":"McAfee Labs","twitter_card":"summary_large_image","twitter_creator":"@McAfee_Labs","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee Labs","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/"},"author":{"name":"McAfee Labs","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad"},"headline":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities","datePublished":"2016-03-16T04:00:34+00:00","dateModified":"2025-06-04T09:26:45+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/"},"wordCount":622,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg","keywords":["computer security","cybersecurity","endpoint protection"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/","name":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage"},"thumbnailUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg","datePublished":"2016-03-16T04:00:34+00:00","dateModified":"2025-06-04T09:26:45+00:00","description":"Authentication in the modern enterprise is becoming more difficult. The risks are rising, but adding more security controls can impede workers and are","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#primaryimage","url":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg","contentUrl":"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/Bio-Vulns-crop.jpg"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/report-highlights-enterprise-biometric-vulnerabilities-opportunities\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Report Highlights Enterprise Biometric Vulnerabilities, Opportunities"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/86f325fa6532a017d06d6b49a2f3b1ad","name":"McAfee Labs","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/af947d76ffbef8521094b476cf8050c3","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2017\/07\/Social-Media-PF-Logo-Pic-300x300-2-96x96.jpg","caption":"McAfee Labs"},"description":"McAfee Labs is one of the leading sources for threat research, threat intelligence, and cybersecurity thought leadership. See our blog posts below for more information.","sameAs":["https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee_Labs"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee-labs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48174","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/695"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=48174"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48174\/revisions"}],"predecessor-version":[{"id":215088,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/48174\/revisions\/215088"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=48174"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=48174"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=48174"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=48174"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}