{"id":1057,"date":"2020-06-19T16:37:41","date_gmt":"2020-06-19T11:07:41","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=1057"},"modified":"2020-06-19T16:41:44","modified_gmt":"2020-06-19T11:11:44","slug":"home-office-can-also-become-a-security-risk-for-the-company","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/","title":{"rendered":"Home Office Can Also Become A Security Risk For The Company"},"content":{"rendered":"<p>At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities. They often don&#8217;t think about the safety of their jobs. Employees connect to the corporate network from home with too little care, but all the systems connected to it are susceptible to cyber-attacks.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655ddecdb1638\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655ddecdb1638\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Create_Technical_Requirements\" title=\"Create Technical Requirements\">Create Technical Requirements<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Malware_Spread_Increased_Sharply\" title=\"Malware Spread Increased Sharply\">Malware Spread Increased Sharply<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Introduce_New_Cybersecurity_Processes\" title=\"Introduce New Cybersecurity Processes\">Introduce New Cybersecurity Processes<\/a><ul class='ez-toc-list-level-3'><li class='ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Inform_Employees_Of_The_Threats\" title=\"Inform Employees Of The Threats\">Inform Employees Of The Threats<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#User_Identity_And_Access_Management\" title=\"User Identity And Access Management\">User Identity And Access Management<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Use_Your_VPN_If_This_Is_Economically_Feasible\" title=\"Use Your VPN If This Is Economically Feasible\">Use Your VPN If This Is Economically Feasible<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Use_Cloud-Based_Solutions_For_VPNs_For_The_Home_Office\" title=\"Use Cloud-Based Solutions For VPNs For The Home Office\">Use Cloud-Based Solutions For VPNs For The Home Office<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Introduce_Security_Policies_Methods_Processes\" title=\"Introduce Security Policies, Methods &amp; Processes\">Introduce Security Policies, Methods &amp; Processes<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-3'><a class=\"ez-toc-link ez-toc-heading-9\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#Extend_Patch_Management\" title=\"Extend Patch Management\">Extend Patch Management<\/a><\/li><\/ul><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"Create_Technical_Requirements\"><\/span>Create Technical Requirements<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>However, human behavior is not the only factor that, before Covid-19, had often prevented companies from enabling employees to work from home. Because organizations have to provide their employees with the appropriate solutions if required: laptops, mobile phones, modems, routers, reliable broadband connections, VPNs, firewalls, access to corporate systems, networks and data, access to systems and data from partners and suppliers, communication and collaboration tools and enterprise applications. In all cases, the strongest focus should be on security.<\/p>\n<p>In many industries, however, the IT infrastructure and risk &amp; compliance teams are not used to taking the existing high compliance requirements into account for employees in the home office. But this is now part of the overall infrastructure support and management requirements.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Malware_Spread_Increased_Sharply\"><\/span>Malware Spread Increased Sharply<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>In addition to traditional and more predictable attacks, researchers discovered two innovative corona-related malware attacks in early March. They were successful at the time because users searched for information about the virus and unintentionally fell victim to these attacks.<\/p>\n<p>One of these attacks used a phishing email to spread the Remcos RAT malware. She used obfuscation and anti-debugging methods so that the malware was not recognized and could spread accordingly. The second attack used an MS Office document to open a back door to the systems.<\/p>\n<p>Check Point has now discovered 4,000 websites related to the Coronavirus. Three percent of them are malignant and another five percent have been classified as suspicious.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Introduce_New_Cybersecurity_Processes\"><\/span>Introduce New Cybersecurity Processes<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The infrastructure teams must now also take into account that working at home will attract a large number of hackers and cybercriminals. Therefore, they need to implement new cybersecurity processes that enable.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Inform_Employees_Of_The_Threats\"><\/span><strong>Inform Employees Of The Threats<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Security threats include phishing attacks, malware, viruses, scareware, spyware, worms, misleading applications downloaded on endpoint systems, etc.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"User_Identity_And_Access_Management\"><\/span><strong>User Identity And Access Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To increase the level of security. Only verified and authenticated devices and users with multi-factor authentication are permitted.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Use_Your_VPN_If_This_Is_Economically_Feasible\"><\/span><strong>Use Your VPN If This Is Economically Feasible<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>Although this proven method is relatively complex and expensive, it is necessary for sensitive or business-critical environments.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Use_Cloud-Based_Solutions_For_VPNs_For_The_Home_Office\"><\/span><strong>Use Cloud-Based Solutions For VPNs For The Home Office<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>These include relatively inexpensive solutions that are available on request and can be quickly installed for use.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Introduce_Security_Policies_Methods_Processes\"><\/span><strong>Introduce Security Policies, Methods &amp; Processes<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To enforce data protection requirements. Depending on the development, the guidelines must be kept up to date.<\/p>\n<h3><span class=\"ez-toc-section\" id=\"Extend_Patch_Management\"><\/span><strong>Extend Patch Management<\/strong><span class=\"ez-toc-section-end\"><\/span><\/h3>\n<p>To all remote devices and endpoints. If companies give cybersecurity the necessary attention, employees can work safely, efficiently, and cost-effectively from home &#8211; and usually in a pleasant environment. This is how virtue can be made out of necessity: by introducing a sustainable lifestyle and a secure digital way of working.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/will-be-a-year-of-hindsight-for-sd-wan-in-2020\/\">Will Be A Year Of Hindsight For SD-WAN In 2020<\/a><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities. They often&#8230;<\/p>\n","protected":false},"author":1,"featured_media":1058,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169],"tags":[96,151],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Home Office Can Also Become A Cybersecurity Risk For The Company<\/title>\n<meta name=\"description\" content=\"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don&#039;t think.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Home Office Can Also Become A Cybersecurity Risk For The Company\" \/>\n<meta property=\"og:description\" content=\"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don&#039;t think.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2020-06-19T11:07:41+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-06-19T11:11:44+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Home-Office-Can-Also-Become-A-Security-Risk-For-The-Company-Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Home Office Can Also Become A Security Risk For The Company\",\"datePublished\":\"2020-06-19T11:07:41+00:00\",\"dateModified\":\"2020-06-19T11:11:44+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\"},\"wordCount\":521,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Cybersecurity\",\"Security\"],\"articleSection\":[\"SECURITY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\",\"url\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\",\"name\":\"Home Office Can Also Become A Cybersecurity Risk For The Company\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2020-06-19T11:07:41+00:00\",\"dateModified\":\"2020-06-19T11:11:44+00:00\",\"description\":\"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don't think.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Home Office Can Also Become A Security Risk For The Company\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Home Office Can Also Become A Cybersecurity Risk For The Company","description":"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don't think.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/","og_locale":"en_US","og_type":"article","og_title":"Home Office Can Also Become A Cybersecurity Risk For The Company","og_description":"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don't think.","og_url":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/","og_site_name":"Trends Tech Blog","article_published_time":"2020-06-19T11:07:41+00:00","article_modified_time":"2020-06-19T11:11:44+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Home-Office-Can-Also-Become-A-Security-Risk-For-The-Company-Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"3 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Home Office Can Also Become A Security Risk For The Company","datePublished":"2020-06-19T11:07:41+00:00","dateModified":"2020-06-19T11:11:44+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/"},"wordCount":521,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Cybersecurity","Security"],"articleSection":["SECURITY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/","url":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/","name":"Home Office Can Also Become A Cybersecurity Risk For The Company","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2020-06-19T11:07:41+00:00","dateModified":"2020-06-19T11:11:44+00:00","description":"At home, the situation is different: employees are more relaxed and maybe distracted by roommates or private activities.They often don't think.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/home-office-can-also-become-a-security-risk-for-the-company\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Home Office Can Also Become A Security Risk For The Company"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1057"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=1057"}],"version-history":[{"count":2,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1057\/revisions"}],"predecessor-version":[{"id":1060,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/1057\/revisions\/1060"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/1058"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=1057"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=1057"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=1057"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}