{"id":50960,"date":"2016-06-29T14:41:51","date_gmt":"2016-06-29T21:41:51","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50960"},"modified":"2025-08-31T22:19:16","modified_gmt":"2025-09-01T05:19:16","slug":"security-internet-of-things","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/","title":{"rendered":"What It Takes for Security in the Internet of Things"},"content":{"rendered":"<p>The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly integrated. And it may happen sooner than you realize: analysts believe 50 billion devices will be connected to the internet by 2020<sup>1<\/sup>. But that prediction may not last. A new report by Accenture, <a href=\"https:\/\/www.accenture.com\/_acnmedia\/PDF-3\/Accenture-Igniting-Growth-in-Consumer-Technology.pdf\" target=\"_blank\" rel=\"noopener\">Igniting Growth in Consumer Technology<\/a>, has found that most people are uncomfortable with IoT (Internet of Things) products, particularly due to cybersecurity concerns.<\/p>\n<p>The Accenture report reveals that 47 percent of consumers identified privacy and security risks as a major drawback of IoT products. Cybersecurity is certainly playing a critical role in IoT adoption, or lack thereof. According to the report, these concerns have caused 37 percent of respondents to be cautious about their use, 24 percent to delay purchasing devices, and 18 percent to stop using products they\u2019ve already bought. Let me put it this way: if you happened to ask five random strangers on the street, four of them would say they worry about IoT safety.<\/p>\n<p>The fact that IoT security may be lacking is, of course, bad news, but it\u2019s great to see people so well-educated on the topic. Perhaps they\u2019ve read any of the numerous stories on IoT hackings and vulnerabilities over the past year. Though there\u2019s certainly an element of sensationalism in many of these reports, the truth is, real concerns exist for IoT devices. Any omnipresent item in our living spaces, where we typically have a strong expectation of privacy, requires a high degree of trust\u2014which companies must earn by the quality and safeguards of their connected products.<\/p>\n<p>Some organizations have stepped up to this challenge. Others haven\u2019t. Take a previous incident with <a href=\"http:\/\/www.forbes.com\/sites\/kashmirhill\/2014\/05\/27\/article-may-scare-you-away-from-internet-of-things\/#5cfc027223dd\" target=\"_blank\" rel=\"noopener\">baby monitors<\/a>, reported by Forbes. A group of researchers discovered and reported vulnerabilities in a set of baby monitors (in the respective company\u2019s community forum, no less), but the manufacturer took no action. In fact, Sergey Shekyan, who discovered the security gaps, originally wanted to test the security of the device because he believed \u201ca camera cannot do all this for $40 and do it right.\u201d Unfortunately, he was correct. Cybercriminals exploited those holes in security, spying on sleeping babies via webcam.<\/p>\n<p>Naturally, people are right to be indignant about companies that don\u2019t take security seriously. As IoT products become more common, we as consumers have to raise our security standards. After watching this market grow, and closely monitoring the highs and lows along the way, it seems clear that there are two necessary changes to reach the era of safe IoT. First, businesses need to prioritize user safety and build secure products by incorporating security controls and privacy settings into their design; second, consumers should know best practices for purchasing and maintaining security of IoT devices.<\/p>\n<h2>Tips to Consider Before Purchasing or Enabling an IoT Device<\/h2>\n<p>Here are some tips for you to consider before purchasing or enabling an IoT device:<\/p>\n<ul>\n<li><strong>Research the product\u2019s security track record.<\/strong> We\u2019re in the early days of IoT and safety gaps will surely be discovered. Before buying a product, see if it, or the company offering it, has had issues in the past. A quick Google search can even do the trick. You can also search on the Federal Trade Commission\u2019s website for prior enforcement actions. By doing your research, you may find some companies ignore their product\u2019s security issues, while others are more proactive.<\/li>\n<\/ul>\n<ul>\n<li><strong>Take advantage of security settings. <\/strong>Some devices will offer advanced configuration, and you should make the most of them. Certain IoT products may offer separated networking, similar to a guest Wi-Fi network alongside your main connection. That\u2019s just one feature\u2014more may come with other products.<\/li>\n<\/ul>\n<ul>\n<li><strong>Keep current on the latest IoT threats. <\/strong>It\u2019s easier for cybercriminals to break into old, outdated software. Update device software and use anti-virus or monitoring tools whenever possible, and always keep an eye out for any news that may affect your IoT security.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-43387 alignleft\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/gary1.jpg\" alt=\"gary\" width=\"150\" height=\"150\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg 150w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-32x32.jpg 32w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-64x64.jpg 64w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-96x96.jpg 96w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1-128x128.jpg 128w\" sizes=\"auto, (max-width: 150px) 100vw, 150px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p><strong>Footnotes<\/strong><\/p>\n<p>1. <a href=\"http:\/\/www.cisco.com\/c\/en\/us\/solutions\/collateral\/service-provider\/global-cloud-index-gci\/Cloud_Index_White_Paper.pdf\" target=\"_blank\" rel=\"noopener\">Cisco Global Cloud Index: Forecast and Methodology, 2013\u20132018 (white paper)<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat,&#8230;<\/p>\n","protected":false},"author":674,"featured_media":64135,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661,1838],"tags":[76,4131,4162],"coauthors":[3973],"class_list":["post-50960","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","category-mobile-security","tag-cybercrime","tag-internet-of-things","tag-security"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What It Takes for Security in the Internet of Things | McAfee Blog<\/title>\n<meta name=\"description\" content=\"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What It Takes for Security in the Internet of Things | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-29T21:41:51+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-09-01T05:19:16+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"150\" \/>\n\t<meta property=\"og:image:height\" content=\"150\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"What It Takes for Security in the Internet of Things\",\"datePublished\":\"2016-06-29T21:41:51+00:00\",\"dateModified\":\"2025-09-01T05:19:16+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\"},\"wordCount\":694,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg\",\"keywords\":[\"cybercrime\",\"Internet of Things\",\"security\"],\"articleSection\":[\"Internet Security\",\"Mobile Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\",\"name\":\"What It Takes for Security in the Internet of Things | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg\",\"datePublished\":\"2016-06-29T21:41:51+00:00\",\"dateModified\":\"2025-09-01T05:19:16+00:00\",\"description\":\"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg\",\"width\":7016,\"height\":4962},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"What It Takes for Security in the Internet of Things\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What It Takes for Security in the Internet of Things | McAfee Blog","description":"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"What It Takes for Security in the Internet of Things | McAfee Blog","og_description":"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-06-29T21:41:51+00:00","article_modified_time":"2025-09-01T05:19:16+00:00","og_image":[{"width":150,"height":150,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/gary1.jpg","type":"image\/jpeg"}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"What It Takes for Security in the Internet of Things","datePublished":"2016-06-29T21:41:51+00:00","dateModified":"2025-09-01T05:19:16+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/"},"wordCount":694,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg","keywords":["cybercrime","Internet of Things","security"],"articleSection":["Internet Security","Mobile Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/","name":"What It Takes for Security in the Internet of Things | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg","datePublished":"2016-06-29T21:41:51+00:00","dateModified":"2025-09-01T05:19:16+00:00","description":"The next time you buy a car, chances are, it\u2019ll be connected to your phone. Maybe your next refrigerator, thermostat, or child\u2019s toy will be similarly","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/Internet-of-things-IOT-and-digital-business-process-automation-concept-supporting-industrial-value-chain.jpg","width":7016,"height":4962},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/security-internet-of-things\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"What It Takes for Security in the Internet of Things"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50960","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50960"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50960\/revisions"}],"predecessor-version":[{"id":221877,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50960\/revisions\/221877"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/64135"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50960"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50960"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50960"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50960"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}