{"id":99533,"date":"2024-08-13T05:20:27","date_gmt":"2024-08-13T12:20:27","guid":{"rendered":"\/blogs\/?p=99533"},"modified":"2024-08-12T09:37:35","modified_gmt":"2024-08-12T16:37:35","slug":"how-secure-is-video-conferencing","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/","title":{"rendered":"How Secure is Video Conferencing?"},"content":{"rendered":"<p>For millions of people, it\u2019s not a workday without it \u2014 video conferencing. And plenty of business gets done that way, which has made conferencing a target for hackers. That then begs\u00a0the\u00a0important question, how secure is video conferencing?<\/p>\n<p>The answer is pretty secure if you\u2019re using a reputable service. Yet you can take further steps to keep hackers and party crashers out of your meetings.<\/p>\n<h2><strong>Why would someone want to crash your meeting?\u00a0<\/strong><\/h2>\n<p>Hackers and party crashers are likely motivated by one of two things: financial gain or mischief.<\/p>\n<p>Given that some meetings involve confidential or sensitive info, someone might have financial motivation to join in, spy\u00a0on,\u00a0or record the meeting. Recently, we saw the lengths at least one AI company went to\u00a0when it spied on a competitor\u2019s video conference call.<a href=\"#_edn1\" name=\"_ednref1\">[i]<\/a><\/p>\n<p>And of course, some bad actors want to cause a disruption. As we saw in recent years, they\u2019ll barge right into a meeting and create a ruckus with rude speech and other antics.<\/p>\n<p>Falling somewhere in between, some hackers might try to intrude on a meeting and\u00a0slip a malware-laden attachment into chat.<a href=\"#_edn2\" name=\"_ednref2\">[ii]<\/a> For one, that can lead to a major disruption. And in a business context, financial disruption as well.<\/p>\n<p>How do they pull it off? The typical avenues of attack apply. They might use stolen or hijacked accounts. The meeting was inadvertently set to \u201cpublic,\u201d allowing anyone with a link to join. Otherwise, they might compromise a victim\u2019s device to piggyback their way in.<\/p>\n<h2><strong>How to protect your video calls<\/strong><\/h2>\n<p><strong>Use a service with end-to-end encryption.\u00a0<\/strong><\/p>\n<p>Put\u00a0simply, end-to-end encryption provides\u00a0a solid\u00a0defense against prying eyes. With it in place, this form of encryption makes it particularly difficult for hackers to tap into the call and the data shared within it.\u00a0Secure\u00a0video conferencing should use 256-bit AES GCM encryption for audio and video, and for sharing of screens, whiteboard apps, and the like. On a related note, read the service\u2019s privacy policy and ensure that its privacy, security, and data measures fit your needs.<\/p>\n<p><strong>Make your meetings private and protect them with a password.\u00a0<\/strong><\/p>\n<p>Keep the uninvited out. First, setting your meeting to private (invitees only) will help keep things secure. Some apps also provide a notification to the meeting organizer when an invite gets forwarded. Use that feature if it\u2019s available. Also, a password provides another hurdle for a hacker or bad actor to clear. Use a fresh one for each meeting.<\/p>\n<p><strong>Use the waiting room.\u00a0<\/strong><\/p>\n<p>Many services put attendees into a waiting room before they enter the meeting proper. Use this feature to control who comes in and out.<\/p>\n<p><strong>Block users from taking control of the screen.\u00a0<\/strong><\/p>\n<p>Welcome or unwelcome, you can keep guests from taking over the screen. Select the option to block everyone except the host (you) from screen sharing.<\/p>\n<p><strong>Turn on automatic updates on your conferencing app.\u00a0<\/strong><\/p>\n<p>By turning on automatic updates, you\u2019ll get the latest security patches\u202fand enhancements\u202ffor your video conferencing tool as soon as they become available.<\/p>\n<p><strong>Get wise to phishing scams.\u00a0<\/strong><\/p>\n<p>Some interlopers make it into meetings by impersonating others. Just as bad actors use phishing emails and texts to steal personal financial info, they\u2019ll use them to steal company credentials as well. Our\u00a0<a href=\"https:\/\/media.mcafeeassets.com\/content\/dam\/npcld\/ecommerce\/en-us\/docs\/guides\/gd-phishing-security-guide.pdf\">Phishing Scam Protection Guide<\/a>\u00a0can show you how to steer clear of these attacks.<\/p>\n<p><strong>Use online protection software.\u00a0<\/strong><\/p>\n<p>Comprehensive\u00a0<a href=\"https:\/\/www.mcafee.com\/en-us\/identity-theft\/family.html?path=blogs\">online protection software like ours<\/a>\u00a0can make for safer calls in several ways. For one, it protects you against malware attacks, such as if a bad actor tries to slip a sketchy download into your meeting. Further, it includes a password manager that creates and stores strong, unique passwords securely. This can help increase the security of your video conferencing account.<\/p>\n<h2><strong>Also, get wise to AI deepfakes on video calls<\/strong><\/h2>\n<p>This is a new one. AI deepfake technology continues to evolve, we find ourselves at the point where scammers can create AI imposters in real time.<\/p>\n<p>We\u2019ve seen them use this technology in romance scams, where scammers take on entirely new looks and voices on video calls. And we\u2019ve seen at least one group of scammers bilk a company out of $25 million with deepfaked executives on a call.<a href=\"#_edn3\" name=\"_ednref3\">[iii]<\/a><\/p>\n<p>Strange as it might sound, this kind of deepfake technology is possible today. And realizing that fact is the first step toward prevention. Next, that calls for extra scrutiny.<\/p>\n<p>Any time-sensitive info or sums of money are involved, get confirmation of the request. Place a phone call to the person after receiving the request to ensure it\u2019s indeed legitimate. Better yet, meet the individual in person if possible. In all, contact them outside the email, message, or call that initially made the request to ensure you\u2019re not dealing with an imposter.<\/p>\n<h2><strong>The safer video conference call<\/strong><\/h2>\n<p>With the right provider and right steps in place, video calls can be quite secure. Use a solution that offers end-to-end encryption, keep your app updated for the latest security measures, and lock down the app\u2019s security settings. Also, recognize that AI has changed the way we look at just about everything online \u2014 including people on the other side of the screen. As we\u2019ve seen, AI imposters on calls now fall into the realm of possibility. A costly one at that.<\/p>\n<p><a href=\"#_ednref1\" name=\"_edn1\">[i]<\/a> <a href=\"https:\/\/www.nytimes.com\/2023\/08\/07\/technology\/ai-start-ups-competition.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.nytimes.com\/2023\/08\/07\/technology\/ai-start-ups-competition.html<\/a><\/p>\n<p><a href=\"#_ednref2\" name=\"_edn2\">[ii]<\/a> <a href=\"https:\/\/www.pcmag.com\/news\/hackers-circulate-malware-by-breaking-into-microsoft-teams-meetings\" target=\"_blank\" rel=\"noopener\">https:\/\/www.pcmag.com\/news\/hackers-circulate-malware-by-breaking-into-microsoft-teams-meetings<\/a><\/p>\n<p><a href=\"#_ednref3\" name=\"_edn3\">[iii]<\/a> <a href=\"https:\/\/www.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html\" target=\"_blank\" rel=\"noopener\">https:\/\/www.cnn.com\/2024\/02\/04\/asia\/deepfake-cfo-scam-hong-kong-intl-hnk\/index.html<\/a><\/p>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>For millions of people, it\u2019s not a workday without it \u2014 video conferencing. And plenty of business gets done that&#8230;<\/p>\n","protected":false},"author":1407,"featured_media":198531,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[10661],"tags":[1814,4452,32,142,3952,18,4827],"coauthors":[15735],"class_list":["post-99533","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-internet-security","tag-computer-security","tag-cybersecurity","tag-data-protection","tag-tag-identity-theft","tag-internet-security","tag-network-security","tag-vulnerability"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>How Secure Is Video Conferencing? | McAfee<\/title>\n<meta name=\"description\" content=\"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"How Secure Is Video Conferencing? | McAfee\" \/>\n<meta property=\"og:description\" content=\"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-08-13T12:20:27+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_081723.png\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"200\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"Jasdev Dhaliwal\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@McAfee\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Jasdev Dhaliwal\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\"},\"author\":{\"name\":\"Jasdev Dhaliwal\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\"},\"headline\":\"How Secure is Video Conferencing?\",\"datePublished\":\"2024-08-13T12:20:27+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\"},\"wordCount\":924,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png\",\"keywords\":[\"computer security\",\"cybersecurity\",\"data protection\",\"identity theft\",\"internet security\",\"network security\",\"vulnerability\"],\"articleSection\":[\"Internet Security\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\",\"name\":\"How Secure Is Video Conferencing? | McAfee\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png\",\"datePublished\":\"2024-08-13T12:20:27+00:00\",\"description\":\"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png\",\"width\":300,\"height\":200},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Internet Security\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/internet-security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"How Secure is Video Conferencing?\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f\",\"name\":\"Jasdev Dhaliwal\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg\",\"caption\":\"Jasdev Dhaliwal\"},\"description\":\"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.\",\"sameAs\":[\"https:\/\/www.linkedin.com\/in\/jasdhaliwal\/\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"How Secure Is Video Conferencing? | McAfee","description":"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"How Secure Is Video Conferencing? | McAfee","og_description":"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?","og_url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2024-08-13T12:20:27+00:00","og_image":[{"width":300,"height":200,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2022\/05\/300x200_Blog_081723.png","type":"image\/png"}],"author":"Jasdev Dhaliwal","twitter_card":"summary_large_image","twitter_creator":"@McAfee","twitter_site":"@McAfee","twitter_misc":{"Written by":"Jasdev Dhaliwal","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/"},"author":{"name":"Jasdev Dhaliwal","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f"},"headline":"How Secure is Video Conferencing?","datePublished":"2024-08-13T12:20:27+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/"},"wordCount":924,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png","keywords":["computer security","cybersecurity","data protection","identity theft","internet security","network security","vulnerability"],"articleSection":["Internet Security"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/","url":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/","name":"How Secure Is Video Conferencing? | McAfee","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png","datePublished":"2024-08-13T12:20:27+00:00","description":"Whether you\u2019re attending work meetings or catching up with family, video conferencing is an alternative to activities we can no longer do in real life. But as the rapid adoption of video conferencing occurs, is security falling by the wayside?","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2020\/08\/300x200_Blog_081324.png","width":300,"height":200},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/internet-security\/how-secure-is-video-conferencing\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Internet Security","item":"https:\/\/www.mcafee.com\/blogs\/internet-security\/"},{"@type":"ListItem","position":3,"name":"How Secure is Video Conferencing?"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/49b8ff7075f52333a95710a8340c326f","name":"Jasdev Dhaliwal","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/25b6fc7c367684ebf6f6144e3dde58e6","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/MePortrait-96x96.jpg","caption":"Jasdev Dhaliwal"},"description":"Jasdev is a Director of Marketing at McAfee and a specialist in consumer security and online privacy. With over 10 years of security industry experience, he is a regular writer on the current security landscape and likes to educate others on how to keep themselves, their families, and their homes safe online.","sameAs":["https:\/\/www.linkedin.com\/in\/jasdhaliwal\/"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/jasdev-dhaliwal\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99533","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/1407"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=99533"}],"version-history":[{"count":9,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99533\/revisions"}],"predecessor-version":[{"id":198561,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/99533\/revisions\/198561"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/198531"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=99533"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=99533"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=99533"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=99533"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}