{"id":3027,"date":"2021-10-21T21:49:11","date_gmt":"2021-10-21T16:19:11","guid":{"rendered":"https:\/\/www.trendstechblog.com\/?p=3027"},"modified":"2021-10-21T21:50:26","modified_gmt":"2021-10-21T16:20:26","slug":"cyber-attack-prevention-plan","status":"publish","type":"post","link":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/","title":{"rendered":"Basic Checklist For A Cyber Attack Prevention Plan"},"content":{"rendered":"<p>Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine the success of an IT deployment, it is essential to consider its <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/category\/security\/\"><strong>security<\/strong><\/a><\/span> to avoid suffering cyberattacks. It is necessary to review all the points related to other internal and external resources and systems, closing possible entry doors to the numerous threats that the corporate IT infrastructure currently faces.<\/p>\n<div id=\"ez-toc-container\" class=\"ez-toc-v2_0_58 counter-hierarchy ez-toc-counter ez-toc-transparent ez-toc-container-direction\">\n<p class=\"ez-toc-title\">Table of Contents<\/p>\n<label for=\"ez-toc-cssicon-toggle-item-655dd93388bad\" class=\"ez-toc-cssicon-toggle-label\"><span class=\"\"><span class=\"eztoc-hide\" style=\"display:none;\">Toggle<\/span><span class=\"ez-toc-icon-toggle-span\"><svg style=\"fill: #999;color:#999\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" class=\"list-377408\" width=\"20px\" height=\"20px\" viewBox=\"0 0 24 24\" fill=\"none\"><path d=\"M6 6H4v2h2V6zm14 0H8v2h12V6zM4 11h2v2H4v-2zm16 0H8v2h12v-2zM4 16h2v2H4v-2zm16 0H8v2h12v-2z\" fill=\"currentColor\"><\/path><\/svg><svg style=\"fill: #999;color:#999\" class=\"arrow-unsorted-368013\" xmlns=\"http:\/\/www.w3.org\/2000\/svg\" width=\"10px\" height=\"10px\" viewBox=\"0 0 24 24\" version=\"1.2\" baseProfile=\"tiny\"><path d=\"M18.2 9.3l-6.2-6.3-6.2 6.3c-.2.2-.3.4-.3.7s.1.5.3.7c.2.2.4.3.7.3h11c.3 0 .5-.1.7-.3.2-.2.3-.5.3-.7s-.1-.5-.3-.7zM5.8 14.7l6.2 6.3 6.2-6.3c.2-.2.3-.5.3-.7s-.1-.5-.3-.7c-.2-.2-.4-.3-.7-.3h-11c-.3 0-.5.1-.7.3-.2.2-.3.5-.3.7s.1.5.3.7z\"\/><\/svg><\/span><\/span><\/label><input type=\"checkbox\"  id=\"ez-toc-cssicon-toggle-item-655dd93388bad\"  aria-label=\"Toggle\" \/><nav><ul class='ez-toc-list ez-toc-list-level-1 ' ><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-1\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#How_To_Prevent_Cyberattacks_Main_Checks\" title=\"How To Prevent Cyberattacks? Main Checks\">How To Prevent Cyberattacks? Main Checks<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-2\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Antivirus_With_EDR\" title=\"Antivirus With EDR\">Antivirus With EDR<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-3\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Data_Leak_And_Encryption_Solutions\" title=\"Data Leak And Encryption Solutions\">Data Leak And Encryption Solutions<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-4\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Securitization_Of_The_CPD_And_System_Accounts_Credentials\" title=\"Securitization Of The CPD And System Accounts (Credentials)\">Securitization Of The CPD And System Accounts (Credentials)<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-5\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Detection_Of_Vulnerabilities_In_Business_Systems\" title=\"Detection Of Vulnerabilities In Business Systems\">Detection Of Vulnerabilities In Business Systems<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-6\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Email_Protection\" title=\"Email Protection\">Email Protection<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-7\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Remote_Access_To_Telecommute_Safely\" title=\"Remote Access To Telecommute Safely\">Remote Access To Telecommute Safely<\/a><\/li><li class='ez-toc-page-1 ez-toc-heading-level-2'><a class=\"ez-toc-link ez-toc-heading-8\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#Awareness_Campaign_Simulation_Of_Cyberattacks\" title=\"Awareness Campaign Simulation Of Cyberattacks\">Awareness Campaign Simulation Of Cyberattacks<\/a><\/li><\/ul><\/nav><\/div>\n<h2><span class=\"ez-toc-section\" id=\"How_To_Prevent_Cyberattacks_Main_Checks\"><\/span>How To Prevent Cyberattacks? Main Checks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>The offer of <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/cybersecurity-of-your-company\/\"><strong>cybersecurity<\/strong><\/a><\/span> products and services is extensive. Next, we look at essential resources and solutions that need to be reviewed to ensure they have the optimal capabilities to respond to enterprise security challenges. The objective is to implement reasonable security practices.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Antivirus_With_EDR\"><\/span>Antivirus With EDR<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is a primary product, but it is necessary to update with solutions incorporating EDR (Endpoint Detection Response) systems to expand its defensive capabilities. This <a href=\"https:\/\/www.trendstechblog.com\/category\/technology\/\"><span style=\"color: #0000ff;\"><strong>technology<\/strong><\/span><\/a> combines traditional features with monitoring tools and artificial intelligence to detect advanced threats beyond malware, exploits, and ransomware. We are talking about polymorphic malware, persistent APT threats, social engineering attacks, Zero Day vulnerabilities (which, due to their novelty, are not yet remedied by the manufacturers), etc. The antivirus with EDR provides capabilities to do forensics to a security incident.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Data_Leak_And_Encryption_Solutions\"><\/span>Data Leak And Encryption Solutions<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>With DLP (Data Loss Prevention) solutions, we go a step further concerning encryption software. They can locate the company&#8217;s confidential information in multichannel environments (folders, Cloud, web, emails.), applying corporate policies to protect it. The most advanced guarantee is the integration of native encryption functions from Apple&#8217;s FileVault and Microsoft&#8217;s BitLocker to achieve comprehensive encryption management. The encryption strategy should also be extended to laptops by encrypting their local disks (if you don&#8217;t have a TPM chip, store the keys on USB sticks). It is desirable to have a solution for the centralized management of encryption keys for all corporate IT to generate reports on the status of the existing encryption to comply with security regulations RGPD, ISO 27001, etc.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Securitization_Of_The_CPD_And_System_Accounts_Credentials\"><\/span>Securitization Of The CPD And System Accounts (Credentials)<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Datacenter protection must be based on Active Directive security policies and goes through the proper installation and maintenance of a log server, centralizing these. It is necessary to configure a firm password policy and its frequent change for administrators and system services at the credential level. It is required to review the accounts with administrator permissions and the compromised email accounts and their application in critical services (domains, websites.), paying particular attention to the double authentication factor when those services are third parties.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Detection_Of_Vulnerabilities_In_Business_Systems\"><\/span>Detection Of Vulnerabilities In Business Systems<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>It is essential to automate this function by using specific solutions. These are capable of scanning vulnerabilities in the company&#8217;s IT infrastructure with the periodicity that is determined. And they focus on the review of components such as network devices, operating systems, virtual environments, applications and databases, services such as SMTP, FTPs, DNSs, mobile devices, etc. Once the scan is finished, teams generate reports and plugins (vulnerability), determining how to resolve the incident. Each exposure is indicated: severity, summary, description and solution.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Email_Protection\"><\/span>Email Protection<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Email is a crucial source of information exchange in organizations, so it is so important to protect it optimally. It is desirable to have a solution designed to check all incoming and outgoing emails for threats such as viruses, malware, phishing and phishing emails. These advanced products incorporate antispam functionalities and reporting tools to identify the most attacked accounts and users. It is also recommended to apply a two-factor authentication configuration.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Remote_Access_To_Telecommute_Safely\"><\/span>Remote Access To Telecommute Safely<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>This scenario is of vital importance today to guarantee safe teleworking. Some of the aspects discussed above intervene in its correct deployment. The designed environment must use encrypted and secure communications with VPN for each remote user and rely on a set of good practices to prevent the entry of malicious access. A dedicated remote connection virtual infrastructure is recommended, distributing the server workload and separating it from the rest. A state-of-the-art firewall will be in charge of securing and encrypting all external communications to avoid security breaches originating in a public environment.<\/p>\n<h2><span class=\"ez-toc-section\" id=\"Awareness_Campaign_Simulation_Of_Cyberattacks\"><\/span>Awareness Campaign Simulation Of Cyberattacks<span class=\"ez-toc-section-end\"><\/span><\/h2>\n<p>Social engineering and phishing cyberattacks directly target the weakest link in the business protection chain &#8211; users. They are making a mistake, having an error. Is inherent to the human condition. Fortunately, we have the collaboration of technology to reduce your success rate. There are solutions to simulate cyber-attacks using templates and to know the behavior of users. The results make it possible to launch different training modules, included in the tool, to train staff to identify latent threats quickly.<\/p>\n<p><span style=\"color: #0000ff;\"><strong>Also Read: <span style=\"color: #0000ff;\"><a style=\"color: #0000ff;\" href=\"https:\/\/www.trendstechblog.com\/ip-centrex-technology\/\">Why Should You Choose IP Centrex Technology<\/a><\/span><\/strong><\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will&#8230;<\/p>\n","protected":false},"author":1,"featured_media":3028,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[169,1],"tags":[103,96,171,151,329],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v21.5 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Basic Checklist For A Cyber Attack Prevention Plan<\/title>\n<meta name=\"description\" content=\"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Basic Checklist For A Cyber Attack Prevention Plan\" \/>\n<meta property=\"og:description\" content=\"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\" \/>\n<meta property=\"og:site_name\" content=\"Trends Tech Blog\" \/>\n<meta property=\"article:published_time\" content=\"2021-10-21T16:19:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-10-21T16:20:26+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2021\/10\/Checklist-For-A-Cyber-Attack.Jpg.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"675\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TrendsTechBlog\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:site\" content=\"@trendstechblog\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TrendsTechBlog\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\"},\"author\":{\"name\":\"TrendsTechBlog\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"headline\":\"Basic Checklist For A Cyber Attack Prevention Plan\",\"datePublished\":\"2021-10-21T16:19:11+00:00\",\"dateModified\":\"2021-10-21T16:20:26+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\"},\"wordCount\":783,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"keywords\":[\"Business\",\"Cybersecurity\",\"Internet\",\"Security\",\"Technology\"],\"articleSection\":[\"SECURITY\",\"TECHNOLOGY\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\",\"url\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\",\"name\":\"Basic Checklist For A Cyber Attack Prevention Plan\",\"isPartOf\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#website\"},\"datePublished\":\"2021-10-21T16:19:11+00:00\",\"dateModified\":\"2021-10-21T16:20:26+00:00\",\"description\":\"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.\",\"breadcrumb\":{\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.trendstechblog.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"SECURITY\",\"item\":\"https:\/\/www.trendstechblog.com\/category\/security\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Basic Checklist For A Cyber Attack Prevention Plan\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.trendstechblog.com\/#website\",\"url\":\"https:\/\/www.trendstechblog.com\/\",\"name\":\"Trends Tech Blog\",\"description\":\"Daily Tech Updates\",\"publisher\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.trendstechblog.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1\",\"name\":\"TrendsTechBlog\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"contentUrl\":\"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png\",\"width\":280,\"height\":70,\"caption\":\"TrendsTechBlog\"},\"logo\":{\"@id\":\"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/\"},\"description\":\"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News.\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Basic Checklist For A Cyber Attack Prevention Plan","description":"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/","og_locale":"en_US","og_type":"article","og_title":"Basic Checklist For A Cyber Attack Prevention Plan","og_description":"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.","og_url":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/","og_site_name":"Trends Tech Blog","article_published_time":"2021-10-21T16:19:11+00:00","article_modified_time":"2021-10-21T16:20:26+00:00","og_image":[{"width":1280,"height":675,"url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2021\/10\/Checklist-For-A-Cyber-Attack.Jpg.jpg","type":"image\/jpeg"}],"author":"TrendsTechBlog","twitter_card":"summary_large_image","twitter_creator":"@trendstechblog","twitter_site":"@trendstechblog","twitter_misc":{"Written by":"TrendsTechBlog","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#article","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/"},"author":{"name":"TrendsTechBlog","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"headline":"Basic Checklist For A Cyber Attack Prevention Plan","datePublished":"2021-10-21T16:19:11+00:00","dateModified":"2021-10-21T16:20:26+00:00","mainEntityOfPage":{"@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/"},"wordCount":783,"commentCount":0,"publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"keywords":["Business","Cybersecurity","Internet","Security","Technology"],"articleSection":["SECURITY","TECHNOLOGY"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/","url":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/","name":"Basic Checklist For A Cyber Attack Prevention Plan","isPartOf":{"@id":"https:\/\/www.trendstechblog.com\/#website"},"datePublished":"2021-10-21T16:19:11+00:00","dateModified":"2021-10-21T16:20:26+00:00","description":"Cybersecurity should be one more layer in any IT project. In other words, when analyzing the different aspects that will determine.","breadcrumb":{"@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.trendstechblog.com\/cyber-attack-prevention-plan\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.trendstechblog.com\/"},{"@type":"ListItem","position":2,"name":"SECURITY","item":"https:\/\/www.trendstechblog.com\/category\/security\/"},{"@type":"ListItem","position":3,"name":"Basic Checklist For A Cyber Attack Prevention Plan"}]},{"@type":"WebSite","@id":"https:\/\/www.trendstechblog.com\/#website","url":"https:\/\/www.trendstechblog.com\/","name":"Trends Tech Blog","description":"Daily Tech Updates","publisher":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.trendstechblog.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/323aae267386ddba7224403d86f419d1","name":"TrendsTechBlog","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/","url":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","contentUrl":"https:\/\/www.trendstechblog.com\/wp-content\/uploads\/2020\/06\/Trends-Tech-Blog-Logo.png","width":280,"height":70,"caption":"TrendsTechBlog"},"logo":{"@id":"https:\/\/www.trendstechblog.com\/#\/schema\/person\/image\/"},"description":"TrendsTechBlog it's a Technologies Related that gives the Technology News, Business, Gadgest, Digital, Mobiles, Social Media, AI. Latest Trends and Up coming News."}]}},"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3027"}],"collection":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/comments?post=3027"}],"version-history":[{"count":1,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3027\/revisions"}],"predecessor-version":[{"id":3029,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/posts\/3027\/revisions\/3029"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media\/3028"}],"wp:attachment":[{"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/media?parent=3027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/categories?post=3027"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.trendstechblog.com\/wp-json\/wp\/v2\/tags?post=3027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}