{"id":50991,"date":"2016-06-30T16:39:04","date_gmt":"2016-06-30T23:39:04","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=50991"},"modified":"2025-05-27T19:28:28","modified_gmt":"2025-05-28T02:28:28","slug":"2016-verizon-dbir-secchat","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/","title":{"rendered":"June #SecChat Recap: Findings from the 2016 Verizon DBIR"},"content":{"rendered":"<p>This year\u2019s highly anticipated <a href=\"https:\/\/www.mcafee.com\/us\/security-awareness\/articles\/verizon-2016-dbir.aspx\" target=\"_blank\" rel=\"noopener noreferrer\">Verizon 2016 Data Breach Investigations Report<\/a> (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260 confirmed breaches, taking a deep dive into popular attack types and threats in 2015. During our June Twitter #SecChat, we discussed findings from the report, and examined prominent threats and their impact on industries. Participating in this chat were experts from McAfee, Verizon, and other industry thought leaders. This lively conversation surfaced enlightening security insights and opinions. Here are some of the highlights:<\/p>\n<h2><strong>Once again, phishing tops the list of attack vectors in the DBIR. Why do you think this method is so successful?<\/strong><\/h2>\n<p>To start the chat, we asked participants for their take on phishing\u2014one of the top attack vectors in 2015 according to the DBIR. Participants offered potential reasons for its success, as well as tips for prevention. McAfee\u2019s <a href=\"https:\/\/twitter.com\/Matt_Rosenquist?lang=en\" target=\"_blank\" rel=\"noopener noreferrer\">@Matt_Rosenquist<\/a> stated that phishing continues to succeed due to ease of the attack, and novice skill-level needed for execution. <a href=\"https:\/\/twitter.com\/marc_spitler\" target=\"_blank\" rel=\"noopener noreferrer\">@Marc_Spitler<\/a> of Verizon followed up, emphasizing that all it takes is a single click for an attack to launch. Overall, experts suggested heightened security culture, education, and employee awareness as ways to mitigate this attack vector.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A1: Phishing is easy, cheap, &amp; sufficiently effective tactic. It exploits human nature weakness. Tech + Behavior controls needed <a href=\"https:\/\/twitter.com\/hashtag\/SecChat?src=hash&amp;ref_src=twsrc%5Etfw\">#SecChat<\/a><\/p>\n<p>&mdash; Matthew Rosenquist (@Matt_Rosenquist) <a href=\"https:\/\/twitter.com\/Matt_Rosenquist\/status\/745693384614936576?ref_src=twsrc%5Etfw\">June 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>https:\/\/twitter.com\/Marc_Spitler\/status\/745694017296408576<\/p>\n<h2><strong>The DBIR shows a steep drop in market prices for stolen payment cards. Does that mean card theft will become unprofitable?<\/strong><\/h2>\n<p>#SecChat participants expressed wariness around card theft, sharing ideas on why dark web prices may be plummeting. McAfee\u2019s <a href=\"https:\/\/twitter.com\/Raj_Samani\" target=\"_blank\" rel=\"noopener noreferrer\">@Raj_Samani<\/a> pointed out that with the lower cost of attack has come a growing ROI\u2014no signs of an unprofitable future. <a href=\"https:\/\/twitter.com\/jc_vazquez\" target=\"_blank\" rel=\"noopener noreferrer\">@jc_vazquez<\/a> added that due to reduced profit from payment card theft, hackers have turned to stealing more valuable user data. <a href=\"https:\/\/twitter.com\/Matt_Rosenquist?lang=en\" target=\"_blank\" rel=\"noopener noreferrer\">@Matt_Rosenquist<\/a> argued that a drop in market price relates to growth in supply, rather than a decline in demand\u2014and that this threat type is still growing.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">no, but now attackers know that medical records and data of users (ransomware) are more profitable <a href=\"https:\/\/twitter.com\/hashtag\/SecChat?src=hash&amp;ref_src=twsrc%5Etfw\">#SecChat<\/a><\/p>\n<p>&mdash; Juan Carlos V\u00e1zquez \uea00 (@jc_vazquez) <a href=\"https:\/\/twitter.com\/jc_vazquez\/status\/745698557366198272?ref_src=twsrc%5Etfw\">June 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">A4: Drop in black market credit card prices from $25 to $6 is due to more supply than demand.  Overall impacts are still rising. <a href=\"https:\/\/twitter.com\/hashtag\/SecChat?src=hash&amp;ref_src=twsrc%5Etfw\">#SecChat<\/a><\/p>\n<p>&mdash; Matthew Rosenquist (@Matt_Rosenquist) <a href=\"https:\/\/twitter.com\/Matt_Rosenquist\/status\/745697531573604352?ref_src=twsrc%5Etfw\">June 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<h2><strong>Consistent with headlines, the DBIR reports a significant increase in ransomware. How can businesses slow its growth?<\/strong><\/h2>\n<p>#SecChat participants agreed that ransomware\u2019s complex nature doesn\u2019t lend itself to one simple solution. As the problem continues to evolve, the industry response remains diverse. <a href=\"https:\/\/twitter.com\/securelexicon\" target=\"_blank\" rel=\"noopener noreferrer\">@Securelexicon<\/a> points out attackers\u2019 growing customer service skills and diligence when picking targets\u2014selecting those who will drive the highest return. <a href=\"https:\/\/twitter.com\/Raj_Samani\" target=\"_blank\" rel=\"noopener noreferrer\">@Raj_Samani<\/a> agreed that the threat\u2019s increased focus on targeting verticals is a growing worry, possibly more problematic than the original scattered approach. @Marc_Spitler proposed that the security community\u2019s focus should shift to limiting ransomware\u2019s impact, a more feasible approach than trying to slow its growth. In addition, <a href=\"https:\/\/twitter.com\/Zulfikar_Ramzan\" target=\"_blank\" rel=\"noopener noreferrer\">@Zulfikar_Ramazan<\/a> argued that a shift in security strategy is the true solution to the problem, with a refocus on the human element of the threat.<\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">certainly new <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#ransomware<\/a> variants are targeting verticals &#8211; more worrying than original scattered approach <a href=\"https:\/\/twitter.com\/hashtag\/SecChat?src=hash&amp;ref_src=twsrc%5Etfw\">#SecChat<\/a><\/p>\n<p>&mdash; Raj Samani (@Raj_Samani) <a href=\"https:\/\/twitter.com\/Raj_Samani\/status\/745701942031179776?ref_src=twsrc%5Etfw\">June 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<blockquote class=\"twitter-tweet\" data-width=\"500\" data-dnt=\"true\">\n<p lang=\"en\" dir=\"ltr\">totally the -as-a-service operators for <a href=\"https:\/\/twitter.com\/hashtag\/ransomware?src=hash&amp;ref_src=twsrc%5Etfw\">#ransomware<\/a> are making it v.simple to use e.g. <a href=\"https:\/\/t.co\/7r7cQLstnF\">https:\/\/t.co\/7r7cQLstnF<\/a> <a href=\"https:\/\/twitter.com\/hashtag\/SecChat?src=hash&amp;ref_src=twsrc%5Etfw\">#SecChat<\/a><\/p>\n<p>&mdash; Raj Samani (@Raj_Samani) <a href=\"https:\/\/twitter.com\/Raj_Samani\/status\/745703074476462080?ref_src=twsrc%5Etfw\">June 22, 2016<\/a><\/p><\/blockquote>\n<p><script async src=\"https:\/\/platform.twitter.com\/widgets.js\" charset=\"utf-8\"><\/script><\/p>\n<p>Our <a href=\"https:\/\/twitter.com\/search?q=%23secchat\" target=\"_blank\" rel=\"noopener noreferrer\">#SecChat<\/a> provided some great insights from both the Verizon 2016 DBIR and the cybersecurity landscape as a whole. Thank you to everyone who joined the conversation! You can view the entire discussion on Twitter using the <a href=\"https:\/\/twitter.com\/search?q=%23secchat\" target=\"_blank\" rel=\"noopener noreferrer\">#SecChat<\/a> hashtag. Be sure to follow <a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee_Business<\/a> to stay informed about upcoming chats.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and 2,260&#8230;<\/p>\n","protected":false},"author":674,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[4452,4185],"coauthors":[3973],"class_list":["post-50991","post","type-post","status-publish","format-standard","hentry","category-mcafee-labs","tag-cybersecurity","tag-phishing"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog<\/title>\n<meta name=\"description\" content=\"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-06-30T23:39:04+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-05-28T02:28:28+00:00\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"June #SecChat Recap: Findings from the 2016 Verizon DBIR\",\"datePublished\":\"2016-06-30T23:39:04+00:00\",\"dateModified\":\"2025-05-28T02:28:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\"},\"wordCount\":545,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"keywords\":[\"cybersecurity\",\"Phishing\"],\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\",\"name\":\"June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"datePublished\":\"2016-06-30T23:39:04+00:00\",\"dateModified\":\"2025-05-28T02:28:28+00:00\",\"description\":\"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"June #SecChat Recap: Findings from the 2016 Verizon DBIR\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog","description":"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog","og_description":"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-06-30T23:39:04+00:00","article_modified_time":"2025-05-28T02:28:28+00:00","author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"June #SecChat Recap: Findings from the 2016 Verizon DBIR","datePublished":"2016-06-30T23:39:04+00:00","dateModified":"2025-05-28T02:28:28+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/"},"wordCount":545,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"keywords":["cybersecurity","Phishing"],"articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/","name":"June #SecChat Recap: Findings from the 2016 Verizon DBIR | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"datePublished":"2016-06-30T23:39:04+00:00","dateModified":"2025-05-28T02:28:28+00:00","description":"This year\u2019s highly anticipated Verizon 2016 Data Breach Investigations Report (Verizon DBIR) analyzed cybersecurity findings from 100,000 incidents and","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/2016-verizon-dbir-secchat\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"June #SecChat Recap: Findings from the 2016 Verizon DBIR"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50991","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=50991"}],"version-history":[{"count":4,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50991\/revisions"}],"predecessor-version":[{"id":214476,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/50991\/revisions\/214476"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=50991"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=50991"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=50991"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=50991"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}