{"id":53045,"date":"2016-10-04T05:00:19","date_gmt":"2016-10-04T12:00:19","guid":{"rendered":"https:\/\/blogs.mcafee.com\/?p=53045"},"modified":"2025-08-19T09:35:19","modified_gmt":"2025-08-19T16:35:19","slug":"sep-2016-threats-report-takeaways","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/","title":{"rendered":"The Old, The New, and The Future: McAfee Labs September Threats Report"},"content":{"rendered":"<p>As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our personal information to apps and services. But cybercriminals know that\u2014in fact, they count on it. The <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/reports\/rp-quarterly-threats-sep-2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">McAfee Labs Threats Report, September 2016<\/a>, reveals that crooks are getting personal, targeting individuals\u2019 data more than ever. It\u2019s gotten easier for them to nab this information, and the report even states \u201cpersonal information about customers or employees now makes up the majority of breaches reported, with payment info a distant third.\u201d<\/p>\n<p>But why is that happening? Shouldn\u2019t advances in technology make us safer? Truth be told, while it can, new vehicles for sharing personal data can also be treasure coves for criminals.<\/p>\n<p>We\u2019re in an age where mobile phones, cloud sharing platforms, and social media are the norm. That\u2019s largely the reason <a href=\"https:\/\/www.mcafee.com\/enterprise\/en-us\/assets\/infographics\/infographic-threats-report-sep-2016.pdf\" target=\"_blank\" rel=\"noopener noreferrer\">why personal data has become such a big target<\/a>. But it\u2019s important to remember that, as much as new technology invites threats, so does older technology. It\u2019s all about ease of access: when attackers see a cybersecurity system (old or new) with loopholes, they\u2019re enticed.<\/p>\n<p>One of the latest cybercriminal ventures? Believe it or not, it\u2019s medical data. Hospital software and technology is more outdated than you think. But cybercriminals dig even deeper than consumers, and they\u2019ve taken advantage of weaknesses, especially in the past year. This year, hospitals have grown to be a massive target for ransomware, with one cybercriminal even gaining $121 million dollars from a handful of campaigns against hospitals.<\/p>\n<p>This increase in ransomware attacks on the healthcare industry isn\u2019t random. It\u2019s due to dated infrastructures that are required to be operational at all times. These systems struggle to integrate new cybersecurity technology with antiquated systems\u2014they\u2019re sitting ducks.<\/p>\n<p>While hospitals contain reservoirs of personalized data, many thieves also going straight to consumers. Age isn\u2019t the only factor; new technologies are also being exploited. Take our use of social media as an example. It provides thieves with a new source for directing and enhancing phishing attacks. Other new platforms, such as cloud technologies, are also harder to protect using old methods. With more of people\u2019s time spent on mobile, crooks are capitalizing there as well. In the second quarter of this 2016 alone, the number of new mobile malware came in as the highest ever recorded at 2,000,000 samples.<\/p>\n<p>The moral of the story is this: personal data is being hunted. Crooks are finding security gaps, in both new and old technologies, to extract the most private of information.<\/p>\n<p>But luckily, there\u2019s a silver lining\u2014IT security is also thinking ahead. The industry is constantly looking into new, inventive ways to keep people safe. As the latest McAfee Labs Threat Report has indicated, the amount of devices connected to the internet and the volume of data increases every year. That allows analytics to slowly become the primary approach to disrupt incoming attacks. From data science to machine learning, we can expect more improved state-of-the-art security solutions day by day.<\/p>\n<p>In fact, we\u2019ve already started. With the release of the McAfee Next Generation Anti-Malware Engine, the centerpiece in our new consumer security lineup, we\u2019re using behavioral analytics and machine learning to better detect threats. This new solution, along with our other product updates, ensures that your mobile, cloud-connected, and wearable technology devices stay secure.<\/p>\n<h2>Tips to Protect Your Personal Data<\/h2>\n<p>Meanwhile, to better safeguard your personal data, here are a few tips to protect yourself:<\/p>\n<ul>\n<li><strong>Time for an upgrade.<\/strong> Don\u2019t let your own records be like that of outdated hospitals. It is critical that you steer clear of having old and susceptible software. Upgrade your devices\u2019 operating systems to the latest versions. More often than not, software updates come with updated security.<\/li>\n<\/ul>\n<ul>\n<li><strong>Have security on your mind when purchasing new technology or accessing a website.<\/strong> Do a quick Google search for a product before you take it home, and make sure its security standing is up to par. Also check what security settings it features. If you\u2019re concerned an individual website is weak, you can use the updated True Key app so you can securely log in.<\/li>\n<\/ul>\n<ul>\n<li><strong>Securely back everything up and be ready for removal<\/strong>. When breaches do happen, damage control is necessary. Having information for your accounts can help you communicate to responsible security teams. So keep copies on an external hard drive. That way, if there is a breach, you don\u2019t lose everything. And if malware is deployed, we promise you won\u2019t be infected for long\u2014our new Virus Protection Pledge products <a href=\"https:\/\/home.mcafee.com\/root\/stdlandingpage.aspx?lpname=vpp_pledge&amp;affid=0&amp;cid=195730\" target=\"_blank\" rel=\"noopener noreferrer\">guarantee 100% virus removal<\/a> or your money back.<\/li>\n<\/ul>\n<p>And of course, stay on top of the latest consumer and mobile security threats by\u00a0<a href=\"https:\/\/www.twitter.com\/garyjdavis\" target=\"_blank\" rel=\"noopener noreferrer\">following me<\/a> and\u00a0<a href=\"https:\/\/twitter.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">@McAfee<\/a>\u00a0on Twitter, and Like us on\u00a0<a href=\"https:\/\/www.facebook.com\/McAfee\" target=\"_blank\" rel=\"noopener noreferrer\">Facebook<\/a>.<\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>As technology makes our lives increasingly convenient, we rely on it more. We use it constantly nowadays, even entrusting our&#8230;<\/p>\n","protected":false},"author":674,"featured_media":133345,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10667,10661,8050],"tags":[4268,214,4549],"coauthors":[3973],"class_list":["post-53045","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-security-news","category-internet-security","category-mcafee-news","tag-cyber-safety","tag-mobile-security1","tag-ransomware"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog<\/title>\n<meta name=\"description\" content=\"What can we take away from the latest McAfee Labs Threats Report? We discuss.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"What can we take away from the latest McAfee Labs Threats Report? We discuss.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:author\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2016-10-04T12:00:19+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-08-19T16:35:19+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/wp-content\/uploads\/gary1.jpg\" \/>\n<meta name=\"author\" content=\"McAfee\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"McAfee\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\"},\"author\":{\"name\":\"McAfee\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\"},\"headline\":\"The Old, The New, and The Future: McAfee Labs September Threats Report\",\"datePublished\":\"2016-10-04T12:00:19+00:00\",\"dateModified\":\"2025-08-19T16:35:19+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\"},\"wordCount\":820,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg\",\"keywords\":[\"cyber safety\",\"mobile security\",\"ransomware\"],\"articleSection\":[\"Security News\",\"Internet Security\",\"McAfee News\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\",\"name\":\"The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg\",\"datePublished\":\"2016-10-04T12:00:19+00:00\",\"dateModified\":\"2025-08-19T16:35:19+00:00\",\"description\":\"What can we take away from the latest McAfee Labs Threats Report? We discuss.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg\",\"width\":1187,\"height\":792,\"caption\":\"financial charts, business analytics and intelligence concept, analysys of ROI and finance performance of company\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"The Old, The New, and The Future: McAfee Labs September Threats Report\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa\",\"name\":\"McAfee\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png\",\"caption\":\"McAfee\"},\"description\":\"We're here to make life online safe and enjoyable for everyone.\",\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/x.com\/McAfee\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog","description":"What can we take away from the latest McAfee Labs Threats Report? We discuss.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog","og_description":"What can we take away from the latest McAfee Labs Threats Report? We discuss.","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_author":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2016-10-04T12:00:19+00:00","article_modified_time":"2025-08-19T16:35:19+00:00","og_image":[{"url":"https:\/\/www.mcafee.com\/wp-content\/uploads\/gary1.jpg","type":"","width":"","height":""}],"author":"McAfee","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"McAfee","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/"},"author":{"name":"McAfee","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa"},"headline":"The Old, The New, and The Future: McAfee Labs September Threats Report","datePublished":"2016-10-04T12:00:19+00:00","dateModified":"2025-08-19T16:35:19+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/"},"wordCount":820,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg","keywords":["cyber safety","mobile security","ransomware"],"articleSection":["Security News","Internet Security","McAfee News"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/","name":"The Old, The New, and The Future: McAfee Labs September Threats Report | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg","datePublished":"2016-10-04T12:00:19+00:00","dateModified":"2025-08-19T16:35:19+00:00","description":"What can we take away from the latest McAfee Labs Threats Report? We discuss.","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/12\/Threat-intel-02-iStock-1212302008.jpeg","width":1187,"height":792,"caption":"financial charts, business analytics and intelligence concept, analysys of ROI and finance performance of company"},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/sep-2016-threats-report-takeaways\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"The Old, The New, and The Future: McAfee Labs September Threats Report"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/47851fdb92fad9456152405839c92efa","name":"McAfee","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/1ffadfeeda1f4f9e7891a81f27a9ecf4","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/Original-Logo-96x96.png","caption":"McAfee"},"description":"We're here to make life online safe and enjoyable for everyone.","sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/x.com\/McAfee"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/mcafee\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53045","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/674"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=53045"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53045\/revisions"}],"predecessor-version":[{"id":220652,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/53045\/revisions\/220652"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/133345"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=53045"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=53045"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=53045"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=53045"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}